Linux-Dictionary ( S - T )

S/MIME (RFC 2311)
S/MIME largely replaces PEM (Privacy Enhanced E-mail). MIME defined a common way that an e-mail message could contain binary attachements, and therefore integrates better into e-mail systems than PEM. PEM was never widely implemented, whereas S/MIME can be found in most popular e-mail readers. 
Sed to Perl translator 
System /360 (IBM), "S/360" 
System /370 (IBM), "S/370" 
Player for MOD and S3M music files This is a tracker music player. It is capable of playing S3M files in addition to 4,6, and 8 track MOD files. It supports dsp output and the Gravis Ultrasound. 
Manage the output device on S3 Savage chips Depending on the Savage chip this utility can be used to switch between LCD, CRT and TV output. Additionally one can choose between NTSC, NTSCJ and pal TV signal format. 
Source [MAC] Address (SNA, Token Ring, ATM, FDDI, ...) 
Storage Array 
Structured Analysis / Strukturierte Analyse (CASE) 
System Administrator 
Systems Analyst 
Standard Application Architecture (IBM) 
Standards Association of Australia (org., Australia) 
Signalling ATM Adaptation Layer (ATM) 
Storage Array Building Block 
An Object-Oriented Compiler Framework SableCC is an object-oriented framework that generates compilers (and interpreters) in the Java programming language. This framework is based on two fundamental design decisions. Firstly, the framework uses object-oriented techniques to automatically build a strictly typed abstract syntax tree that matches the grammar of the compiled language and simplifies debugging. Secondly, the framework generates tree-walker classes using an extended version of the visitor design pattern which enables the implementation of actions on the nodes of the abstract syntax tree using inheritance. These two design decisions lead to a tool that supports a shorter development cycle for constructing compilers. 
an XSL processor fully implemented in C++ Sablotron is an XSL processor fully implemented in C++. The goal of this project is to create a reliable and fast XSLT processor conforming to the W3C specification, which is available for public and can be used as a base for multiplatform XML data distribution systems. This package includes Sablotron binaries, which need libsablot0 to work. 
Set Asynchronous Balanced Mode (LABM, LAPB, HDLC) 
Set Asynchronous Balanced Mode Extension (SABM) 
Fighter plane simulator. SABRE is an on-going game development for the Linux Operating System, worked on as a labor of love by flight-simulation enthusiasts. For now, SABRE is focusing on the older jets and piston-engined fighters of the Korean War / Cold War era. Featured are F-86 SabreJet, MiG-15, F-84 ThunderJet, F-51 Mustang, and Yak-9. All of the planes in the game can be flown by the player as well as the computer pilots. This package contains the svgalib binary. 
Semi-Automatic Business Related Environment (OS, IBM 7090) 
Fighter plane simulator. SABRE is an on-going game development for the Linux Operating System, worked on as a labor of love by flight-simulation enthusiasts. For now, SABRE is focusing on the older jets and piston-engined fighters of the Korean War / Cold War era. Featured are F-86 SabreJet, MiG-15, F-84 ThunderJet, F-51 Mustang, and Yak-9. All of the planes in the game can be flown by the player as well as the computer pilots. This package contains binaries and data common to both svgalib and X version of sabre. Homepage: 
Login accounting Performs login accounting, just like the ac program but with totals, per day and per users. Also performs average usage and hourly profiling. Tons of other options. 
Service / Special Area Code 
Single Attachment Concentrator (FDDI) 
Strict Avalanche Criterion (cryptography) 
Slow Associated Control CHannel (GSM, DCCH, mobile-systems) 
SPARC Application Conformance Test (SI, SPARC) 
Serial Analog Delay 
Semi-Automatic Document Feeder 
Structured Analysis and Design Techniques (SA) 
Service Access Facilities (Unix) 
Security And Freedom through Encryption [law] (USA, cryptography) 
safely copy stdin to a file safecat is a program which implements Professor Daniel Bernstein's maildir algorithm to copy stdin safely to a file in a specified directory. It can be used to write mail messages to a qmail-style maildir, or to write data to a "spool" directory reliably. 
finger client wrapper that protects against nasty stuff from finger servers 
SCSI Accessed Fault-Tolerant Enclose (SCSI, RAID, Intel, NStor), "SAF-TE" 
SQL Access Group (org., manufacturer, DB) 
Semi-Automatic Ground Environment system (OS, IBM AN/FSQ7, mil.) 
Software Aided Group Environment (GSS, NUS) 
Store AH Into Flags (assembler) 
Stanford Artificial Intelligence Laboratory [language] (USA) 
Security Access List 
Semware Applications Language (Semware) 
Symbolic Assembly Language (assembler) 
System Abstraction Layer 
Script Application Language for Telix 
Suse Advanced Linux Technology (Suse, Linux) 
Structured Assembly Language Utilities 
SCSI-3 Architecture Model 
Security Accounts Manager 
Sequential Access Method / Mode (SAM, DAM) 
Sort And Merge 
System Activity Monitor 
the plan9 text editor -- ed with a gui and multi-file editing sam -d can be used without X (with an ed-like interface -- but with more powerful regular expressions, the capacity to edit multiple files with a single command, and unlimited undo). Files can be added to an exiting sam session using the B command. sam without the -d option is an graphical editor with pop-up menus and a point+click interface. You'll want to read sam's manual page to use the full power of sam, but you can probably figure out how to do basic editing with a minimum of trial and error. If you have a Plan 9 terminal, you can use the Plan 9 terminal with sam to edit unix files, but not vice-versa; the Plan 9 authentication scheme does not honor remote execution requests from a non-Plan 9 system. 
SAM (Security Access Monitor)
On Microsoft Windows 2000 (and Windows NT), all the user account information is stored within the SAM. It exists as a single file on the disk. The SAM is the primary target when hackers break into a system because it can be run through a password cracker. Key point: The SAM file is located in the path %systemroot%/system32/config/SAM However, a backup is also stored in the location %systemroot%/repair/sam._ as well as on any repair disk generated. (Note: if new repair disks haven't been created, then you'll likely only be able to see the Administrator's password there). Hackers usually go after the "repair" versions because they are not locked by the operating system. Tools: pwdump/pwdump2 Dumps the current password information using Windows registry calls. Must have administrative access for this to work. The data is written in a format for crack programs. samdump Reads the password information from the SAM file in a format suitable for inputting into crack programs. l0phtcrack The most popular utility for cracking Windows passwords. All these tools are available at History: The original version of WinNT allowed the password hashes to be easily retrieved, making cracking easy. In SP3, an optional utility called SYSKEY was added that encrypts the hashes. In order to decrypt them, the administrator needs to either type in the passphrase at boot time, store the passphrase on a floppy, or put the passphrase in the registry (dramatically reducing security, of course). Whatever way is used to boot the system, the keys are then stored in unencrypted format in memory, so administrative access can still read them (using the pwdump2 utility). SYSKEY is optional on WinNT, but is always running on Win2k. Key point: The PASSPROP and PASSFILT utilities can be used to enforce the choice of better passwords. 
A free software implementation of the server message block (SMB) network file sharing protocol. Samba is usually implemented on networks that have a mixture of UNIX, Linux, and Windows computers and is designed for interoperable file sharing. 
A LanManager like file and printer server for Unix. The Samba software suite is a collection of programs that implements the SMB protocol for unix systems, allowing you to serve files and printers to Windows, NT, OS/2 and DOS clients. This protocol is sometimes also referred to as the LanManager or NetBIOS protocol. This package contains all the components necessary to turn your Debian GNU/Linux box into a powerful file and printer server. Currently, the Samba Debian packages consist of the following: samba - A LanManager like file and printer server for Unix. samba-common - Samba common files used by both the server and the client. smbclient - A LanManager like simple client for Unix. swat - Samba Web Administration Tool samba-doc - Samba documentation. smbfs - Mount and umount commands for the smbfs (kernels 2.0.x and above). libpam-smbpass - pluggable authentication module for SMB password database libsmbclient - Shared library that allows applications to talk to SMB servers libsmbclient-dev - libsmbclient shared libraries winbind: Service to resolve user and group information from Windows NT servers It is possible to install a subset of these packages depending on your particular needs. For example, to access other SMB servers you should only need the smbclient and samba-common packages. 
A lot of emphasis has been placed on peaceful coexistence between UNIX and Windows. Unfortunately, the two systems come from very different cultures and they have difficulty getting along without mediation. ...and that, of course, is Samba's job. Samba <> runs on UNIX platforms, but speaks to Windows clients like a native. It allows a UNIX system to move into a Windows ``Network Neighborhood'' without causing a stir. Windows users can happily access file and print services without knowing or caring that those services are being offered by a UNIX host. All of this is managed through a protocol suite which is currently known as the ``Common Internet File System,'' or CIFS <>. This name was introduced by Microsoft, and provides some insight into their hopes for the future. At the heart of CIFS is the latest incarnation of the Server Message Block (SMB) protocol, which has a long and tedious history. Samba is an open source CIFS implementation, and is available for free from the mirror sites. Samba and Windows are not the only ones to provide CIFS networking. OS/2 supports SMB file and print sharing, and there are commercial CIFS products for Macintosh and other platforms (including several others for UNIX). Samba has been ported to a variety of non-UNIX operating systems, including VMS, AmigaOS, and NetWare. CIFS is also supported on dedicated file server platforms from a variety of vendors. In other words, this stuff is all over the place. 
a suite of programs which work together to allow clients to access to a server's filespace and printers via the SMB (Session Message Block) protocol. This means that you can redirect disks and printers to Unix disks and printers from Lan Manager clients, Windows for Workgroups 3.11 clients, Windows NT clients, Linux clients and OS/2 clients. 
Samba adds Windows-networking support to UNIX. Whereas NFS is the most popular protocol for sharing files among UNIX machines, SMB is the most popular protocol for sharing files among Windows machines. The Samba package adds the ability for UNIX systems to interact with Windows systems. Key point: The Samba package comprises the following: smbd The Samba service allowing other machines (often Windows) to read files from a UNIX machine. nmbd Provides support for NetBIOS. Logically, the SMB protocol is layered on top of NetBIOS, which is in turn layered on top of TCP/IP. smbmount An extension to the mount program that allows a UNIX machine to connect to another machine implicitly. Files can be accessed as if they were located on the local machines. smbclient Allows files to be access through SMB in an explicity manner. This is a command-line tool much like the FTP tool that allows files to be copied. Unlike smbmount, files cannot be accessed as if they were local. smb.conf The configuration file for Samba. 
Samba-client provides some SMB clients, which complement the built-in SMB filesystem in Linux. These allow the accessing of SMB shares, and printing to SMB printers. 
Samba-server provides a SMB server which can be used to provide network services to SMB (sometimes called "Lan Manager") clients. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft Raw NetBIOS frame) protocol. Samba-2.2 features working NT Domain Control capability andincludes the SWAT (Samba Web Administration Tool) that allows samba's smb.conf file to be remotely managed using your favourite web browser. For the time being this is being enabled on TCP port 901 via xinetd. SWAT is now included init's own subpackage, samba-swat. Users are advised to use Samba-2.2 as a Windows NT4 Domain Controller only on networks that do NOT have a WindowsNT Domain Controller. This release does NOT as yet have Backup Domain control ability. Please refer to the WHATSNEW.txt document for fixup information. This binary release includes encrypted password support. Please read the smb.conf file and ENCRYPTION.txt in the docs directory for implementation details. 
Synchronized Accessible Media Interchange (MS) 
Simple Algebraic Math Library A C library for symbolic calculations, accompanied by some application programs (samuel, factorint, induce), and Python bindings. The library provides an object-oriented framework for defining and handling mathematical types, and implements the most common data types of computer algebra: integers, reals, fractions, complex numbers, polynomials, tensors, matrices, etc. The application programs consist of an interactive symbolic calculator (samuel), a programming language (induce) and a program to factorize integers (factorint). 
Sampling rate
The frequency with which a recording device, such as a sound board, takes readings of the sound it is recording. High-quality sound boards, like the equipment used to record audio compact disks, hae sampling rates of 44.1 kilohertz (KHz) or higher. Although sound boards with lower sampling rates might be adequate for recording simple noises or even voice clips, they are not adequate for recording music. 
Storage Area Networks 
A "sandbox" is a mode of running a program that prevents it from having full access to the rest of the system. This is especially important for mobile code such as Java. A client can trust the code automatically downloaded from a web-site if the code runs in a sandbox and cannot harm the rest of the system. Key point: Sandboxes are being used more and more often for servers. This puts walls between different components that can help stop (or slow down) an intruder that has broken into one part of the system. The most important technique is to run services as a user account rather than an administrator/root account. For example, Microsoft's IIS creates a special user account (named "IUSR_XXXX" where XXXX is the system name) that the web-server runs under. When somebody breaks into the web-server, they still cannot gain control over the full system (unless they run some sort of local exploit in order to break out of this sandbox). Example: Example sandboxes are: user accounts As described above, running services under a user account prevents an intruder from gaining control over the entire machine. jail/chroot These utilities limit the view of the filesystem from a program. A program that runs under a chroot environment can only its own subdirectory, but no other parts of the filesystem. virtual machine The technique used by Java is to create an entirely separate "virtual" machine. A Java program has absolutely no access to the real machine except in a few places. A more extensive version of this is software like VMware or SoftPC that creates an entire virtual computer. Using VMware, you can boot a Linux or Windows virtual machine under the real machines. If an intruder compromises the virtual machine, he/she still cannot access the real machine. 
an alarm clock, which is designed as a sand-glass Sanduhr is an alarm clock for the X Window System which uses (and requires) the GNOME desktop environment. It has an extensive manual and a complete CORBA interface. 
Scanner Access Now Easy (Open-Source) 
Scanner graphical front-ends This package includes scanner graphical front-end xscanimage, and xcam, for acquiring images continuously from cameras. An alternative to xscanimage called xsane is packaged separately. The scanner front-ends use SANE. SANE stands for "Scanner Access Now Easy" and is an application programming interface (API) that provides standardized access to any raster image scanner hardware (flatbed scanner, hand-held scanner, video- and still-cameras, frame-grabbers, etc.). The SANE standard is free and its discussion and development is open to everybody. The current source code is written for UNIX (including Linux) and is available under the GNU public license (commercial application and backends are welcome, too, however). 
Standard Apple Numeric Environment (Apple) 
SANE (Scanner Access Now Easy) is a sane and simple interface to both local and networked scanners and other image acquisition devices like digital still and video cameras. SANE currently includes modules for accessing a range of scanners, including models from Agfa SnapScan, Apple,Artec, Canon, CoolScan, Epson, HP, Microtek, Mustek, Nikon, Siemens, Tamarack, UMAX, Connectix, QuickCams and other SANE devices via network. For the latest information on SANE, the SANE standard definition, and mailing list access, see This package does not enable network scanning by default; if you wish to enable it, install the saned package and set up the sane-net backend. This package contains the backends for different scanners. 
find SCSI and USB scanners and their device files 
SANE network daemon 
The Anomy Mail Sanitizer - an email virus scanner The Anomy sanitizer is what most people would call "an email virus scanner". That description is not totally accurate, but it does cover one of the more important jobs that the sanitizer can do for you - it can scan email attachments for viruses. Other things it can do: Disable potentially dangerous HTML code, such as javascript, within incoming email. Protect you from email-based break-in attempts which exploit bugs in common email programs (Outlook, Eudora, Pine, ...). Block or "mangle" attachments based on their file names. This way if you don't *need* to receive e.g. visual basic scripts, then you don't have to worry about the security risk they imply (the ILOVEYOU virus was a visual basic program). This lets you protect yourself and your users from whole classes of attacks, without relying on complex, resource intensive and outdated virus scanning solutions. 
sanity check
Verifying data and/or code does not contain careless errors. In the computer world, this often refers to checking that the output of a program produces the expected results and not inaccurate results from careless programming. From
A utility for displaying and processing astronomical images. SAOimage (pronounced S-A-0-image) is a utility for displaying astronomical images wich runs under the X11 window environment. Image files can be read directly, or image data may be passed through a named pipe (Unix) or a mailbox (VMS) from IRAF display tasks. SAOimage provides a large selection of options for zooming, panning, scaling, coloring, pixel readback, display blinking, and region specification. User interactions are generally performed with the mouse. Capability of reading IRAF 2.11 .imh files added. 
Service Access Point (OSI) 
Service Advertising Protocol (Novell, Netware, IPX) 
Session Announcement Protocol (Internet, RFC 2974) 
Symbolic Assembler Program (IBM, IBM 704) 
SystemAnalyse und Programmentwicklung (manufacturer, predecessor) 
Systems, Applications and Products [in data processing] [ag] (manufacturer) 
A minimal but configurable X11R6 window manager Sapphire is a window manager for X11R6. It is fairly minimal in what it provides on screen: one toolbar, the usual window borders and a popup menu from the root window. It supports themes as X resource files, and the menu is editable. If you install the 'menu' package, you'll get an automatically-updated 'Debian' submenu of installed programs. 
Segmentation And Reassembly 
Store Address Register (IC) 
Standard Automated Remote-to-AUTODIN Host (AUTODIN, mil.) 
An interpreter for AGI resources Sarien decodes and plays games written for the Sierra On-Line Adventure Game Interpreter (AGI) system, such as Leisure Suit Larry in the Land of the Lounge Lizards, Space Quest I and II, and King's Quest I to IV. Currently AGI versions 2 and 3 are recognized; support for older AGI v1 games is not available. You need the files from the original games. 
Segmentation And Reassembly Protocol Data Unit (ATM, PDU), "SAR PDU" 
Structured Analysis / Real Time (SA, CASE), "SA/RT" 
Switched Access Remote Test System 
Session Active Screen (IBM) 
Simulation Automation System 
Single Attachment Station (FDDI) 
Statistical Analysis System 
Specific Application Service Element (ISO, OSI, CASE) 
Sash is a simple, standalone, statically linked shell which includes simplified versions of built-in commands like ls, dd and gzip. Sash is statically linked so that it can work without shared libraries, so it is particularly useful for recovering from certain types of system failures. Sash can also be used to safely upgrade to new versions of shared libraries. 
Stand-alone shell. sash serves as an interactive substitute for /bin/sh, for use when /bin/sh is unusable. It's statically linked, and inludes many standard utilities as builtins (type "help" at the prompt for a reference list). If you've installed sash before rendering your system unbootable, and you have some knowledge of how your system is supposed to work, you might be able to repair your system using init=/bin/sash at the boot prompt. Some people also prefer to have sash available as the shell for a root account (perhaps an under an alternate name such as sashroot) Configuration support is included for people who want this. Note: sash is not intended to serve as /bin/sh, and has few of the interactive features present in bash or ksh. It's designed to be simple and robust, for people who need to do emergency repair work on a system. Also note: sash doesn't include a built-in fsck -- fsck is too big and complicated. If you need fsck, you'll have to get at least one partition or disk working well enough to run fsck. More generally, sash is but one tool of many (backups, backup recovery tools, emergency boot disks or partitions, spare parts, testing of disaster plans, etc.) to help you recover a damaged system. 
Shugart Associates System Interface 
Programs for manipulating the SASL users database This is the Cyrus SASL API implementation. It can be used on the client or server side to provide authentication. See RFC 2222 for more information. This package contains common binary files for plugin modules. 
Programs for manupulating the SASL users database This is the Cyrus SASL API implentation, version 2. See package libsasl2 and RFC 2222 for more information. This package contains common binary files for plugin modules. 
South Australia Standard Time [+0930] (TZ) 
Standard AUTODIN Terminal (AUTODIN, mil.) 
Summed Area Table (3D, MIP) 
Security Administrator Tool for Analyzing Networks (Internet) 
SATAN (Security Administrator Tool for Analyzing Networks)
A vulnerability scanning tool designed to hunt for many ways into a system. Much hyped at the time; people feared that it would give a powerful tool into the hands of hackers everywhere. In practice, it was a dud: it was much to "noisy", was already outdated by the time it was released, was impossible to setup, and hasn't been really maintained. 
SATAN (Security Administrator Tool for Analyzing Networks)
Program designed to assess the security status of a computer or local area network (LAN) connected to the Internet. The program determines whether Internet-related software is misconfigured in a way that could render the system vulnerable to a cracker. The program is controversial because intruders as well as system administrators can use it to find loopholes. The controversy deepened when the program's authors, Dan Farmer and Wietse Venema, made the program publicly available through the Internet. 
SATellite COMmunications 
Shared Access Transport Facility 
Secure Access Unit 
SMTP defence software against spam SAUCE (Software Against Unsolicited Commercial Email) sits between the Internet and your existing Mail Transfer Agent (e.g. Exim). It does a number of checks on incoming mail, including being able to blacklist senders and their sites automatically when they mail special `spam bait' addresses. This is an ALPHA version and should be used by experts only. 
The University of Cincinnati's free VHDL 93 Analyzer This is the analyzer and intermediate representation for a free VHDL simulation system from the University of Cincinnati's Experimental Computation Laboratory. "scram", SAVANT's analyzer, converts VHDL into the AIRE intermediate standard form. AIRE is designed to be extensible by the user so that they can easily insert their own back ends. SAVANT includes a VHDLpublishing back end and a C++ publishing back end. The generated C++ can be compiled and linked against the TyVis library to allow end to end sequential or parallel simulation of VHDL. This version of the Debian package supports only sequential simulation - future releases should support parallel simulation as well. 
Saves the current GNOME session (or terminates it) 
save a log file 
A highly configurable window manager for X11. Sawfish is an extensible window manager using an Emacs Lisp-like scripting language--all window decorations are configurable, the basic idea is to have as much user-interface policy as possible controlled through the Lisp language. This is no layer on top of twm, but a wholly new architecture. 
A highly configurable window manager for X11 and Gnome. Sawfish is an extensible window manager using an Emacs Lisp-like scripting language--all window decorations are configurable, the basic idea is to have as much user-interface policy as possible controlled through the Lisp language. This is no layer on top of twm, but a wholly new architecture. This package contains the capplets to configure Sawfish in the Gnome control center, and the Gnome support. 
Simple API for XML (API, XML) 
SUSE Advanced X [configuration tool] (SUSE, Linux) 
Catalog support and wrapper the Saxon XSLT Processor This package provides a simple front-end to Saxon for processing XML source files with XSL stylesheets. Catalog support is provided by an extension class to Norm Walsh's Arbortext Catalog Classes. A wrapper script for general saxon usage is also included. This package works well for processing DocBook XML sources. Author: Jirka Kosek <> Homepage: 
speaks the current date through your sound card Says the current date and uptime through your sound card. Requires you have a sound output device available. Also includes au2raw, a sox wrapper which converts a .au file to a .raw file. 
speaks the current time through your sound card Say the current time through your sound card. Requires you have a sound output device available. 
Sound Blaster [audio card] (audio) 
SideBand Address [port / bus] (AGP) 
Standards-Based Architectures 
Synchronous Bandwidth Allocation (SMT, FDDI) 
System For Business Automation 
SCSI Block Commands (SAM) 
Single Board Computer 
Small Business Computer 
Single Byte Command Code Set [protocol] 
Steel Bank Common Lisp, a fork from CMUCL SBCL is a Common Lisp compiler with a transparent build process, that aims for correctness and ANSI compliance. 
Single Byte Character Set (ASCII, DBCS) 
Sequential Block Filemanager (OS-9) 
Secure Backbone Hub (Accton) 
Storage Bus Interconnect 
Synchronous Bus Interface 
Sustaining Base Information System 
Super BASIC Language (BASIC) 
Sustaining Base Level Computer 
Smart Boot Manager (SBM) is a full-featured boot manager. Smart Boot Manager (SBM) is an OS independent and full-featured boot manager with an easy-to-use user interface. The main goals of SBM are to be absolutely OS independent, flexible and full-featured. It has all of the features needed to boot a variety of OSes from several kinds of media, while keeping its size no more than 30K bytes. In another words, SBM does NOT touch any of your partitions, it totally fits into the first track (the hidden track) of your hard disk! It's capabilities: * Automatically searches drivers and partitions * Powerful Boot Schedule * Booting from CD-ROM * Swapping driver ID * Auto Delay Boot * Sending keystrokes to the operating system * Easy Customized Theme file * Password protection * Y2k bug work-around for old BIOSes 
Southwestern Bell Mobile Service 
SCSI-3 serial Bus Protocol (SAM) 
Small Business Server 
Tool for building Debian binary packages from Debian sources sbuild builds binary packages from source. It can do its work in chroots so both stable and unstable environments can be used on the same machine. It's also useful for figuring out a package's build dependencies. sbuild is part of the wanna-build build system used by most architectures to build packages for Debian. 
Sun [i/o interface] BUS (Sun, SPARC), "SBus" 
SubCommittee (ISO, TC, IEC, ...) 
Text-based spreadsheet with VI-like keybindings "Spreadsheet Calculator" is a much modified version of the public- domain spread sheet sc, which was posted to Usenet several years ago by Mark Weiser as vc, originally by James Gosling. It is based on rectangular table much like a financial spreadsheet. Its keybindings are familiar to users of 'vi', and it has most features that a pure spreadsheet would, but lacks things like graphing and saving in foreign formats. It's very stable and quite easy to use once you've put a little effort into learning it. 
Scalable Cooperative Architecture 
Software Corporation of America (manufacturer, USA) 
Synchronous Clock Adjustment 
Service Control Agent Function (IN) 
Scandinavian Conference on Artificial Intelligence (conference, FAIS, AI) 
Scalable font
A screen or printer font that you can enlarge or reduce to any size, within a specified range, without introducing unattractive distortions. Outline font technology is most commonly used to provide scalable fonts, but other technologies - including stroke fonts, which form characters from a matrix of lines - are sometimes used. 
scalable Cyrillic fonts This package includes Cyrillic Type1 fonts for the following font families: Times, Helvetica, Courier, Avant Garde, Palatino, New Century Schoolbook, Bookman Light and Teams. 
scalable Cyrillic fonts for TeX This package makes the fonts from the package scalable-cyrfonts available to TeX. It installs all needed TeX font metric files, virtual fonts, font definitions and some style packages. Please read the file /usr/share/doc/scalable-cyrfonts-tex/README.Debian. 
scalable Cyrillic fonts for X This package makes the fonts from the package scalable-cyrfonts available to the X server or font server. For proper reencoding it needs capable X server or font server. 
Scalable Linear Algebra Package ScaLAPACK is the parallel version of LAPACK. It depends on PVM or MPI. This package provides the tester applications. 
Scalable Linear Algebra Package ScaLAPACK is the parallel version of LAPACK. It depends on PVM or MPI. This package provides the tester applications. 
Scalable Linear Algebra Package ScaLAPACK is the parallel version of LAPACK. It depends on PVM or MPI. This package provides the tester applications. 
Test data for ScaLAPACK testers. The ScaLAPACK tester in scalapack-lam-test or scalapack-mpich-test need some data provided by this package. 
Scalable Linear Algebra Package ScaLAPACK is the parallel version of LAPACK. It depends on PVM or MPI. This package provides the shared libraries, it depends on the LAM implementation of MPI. Also included: PBLAS, Parallel Basic Linear Algebra Subprograms. 
Scalable Linear Algebra Package ScaLAPACK is the parallel version of LAPACK. It depends on PVM or MPI. This package provides the shared libraries, it depends on the MPICH implementation of MPI. Also included: PBLAS, Parallel Basic Linear Algebra Subprograms. 
Scalable Linear Algebra Package ScaLAPACK is the parallel version of LAPACK. It depends on PVM or MPI. This package provides the shared libraries needed to run applications. Also included: PBLAS, Parallel Basic Linear Algebra Subprograms. 
SCSI Configured AutoMatically (SCSI) 
Symposium on Computer Applications in Medical Care (conference) 
Switched-Circuit Automatic Network 
scan (scanner)
This word is overused to the point that it is frequently confusing what people are talking about. The problem is that a scanner can be either active or passive. Example: There are variations of virus scanners: background scanner Scans for viruses continuously in the background. on-access scanner Scans a file for viruses whenever it is accessed. on-demand scanner Scans the hard disk looking for viruses whenever told to by the user. 
Portscan detector for Linux. Scandetd is a portscan detector. By default, it logs incoming TCP connections to the host. If a second connection happens within 1 second, it too is logged to syslog. If scandetd recognizes this pattern as a portscan and sends mail to (by default) root@localhost. Scandetd will also attempt to recognize OS fingerprinting probes. It will attempt to determine the tool being used, at this point Queso or NMAP. 
Generate summaries from Apache error logs This program allows people to parse Apache error_log files from multiple sources and present a summary of the frequency of error messages in one of a variety of different formats (text, html, xml, pdf). 
scan an image 
A portscan detecting tool Scanlogd is a daemon written by Solar Designer to detect portscan attacks on your machine. 
Mail scanner for Postfix This program is invoked from the .forward file of a user and scans the incoming mails for .vbs .exe .com .bat, and similar attachments. If a message is clean, it is inserted into the users qmail-style Maildir or it is spooled to the users mbox. Otherwise, it is bounced. 
A peripheral that uses light receptors for reading printed material and digitally transferring the information as image objects into a computer system for processing. 
scan/probe PCI buses 
A CSV-based image sorter and verifier ScanSort allows one to sort and verify images based upon information contained in comma-separated-value (CSV) files. It is designed for use by those who collect series of scans from Usenet, the WWW, etc for which a CSV file containing the image names, sizes, CRCs, etc is available. In addition to its image-sorting capabilities, ScanSort can also help manage CSV collections, create lists of images for trading, etc. 
get SSH server versions for an entire network The scanssh protocol scanner scans a list of addresses and networks for running SSH protocol servers and their version numbers. The scanssh protocol scanner supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH protocol servers in a company or the Internet as whole. 
scan TV channels for stations This utility can scan a channel set for TV stations and write the ones found into a xawtv config file (which is also read by some other utilities like fbtv). It also tries to extract the station names from vbi data. 
Subsystem Control Block (OS/2, IBM) 
SCSI Controller Commands (SAM) 
Serial Communication Controller 
Serial Controller-Chip (IC) 
Softarc Certified Consulter (SoftArc) 
Specialized Common Carrier 
Standards Council of Canada (org., Canada) 
Storage Connecting Circuit 
Signaling Connection Control Part (MSC, GSM, mobile-systems) 
Source Code Control System (Unix, AT&T, CM) 
Specialized Common Carrier Service 
Switching Control Center System 
SPARC Compliance Definition (SI, SPARC) 
Significant CALS Data Elements 
Society for Clinical Data Management Systems (org., USA) 
Structure Chart Editor 
Service Creation Environment Function (IN) 
Societe Canadienne pour l'Etude de l'Intelligence par Ordinateur (org., Canada, AI) 
Selective Call-Forwarding 
Sequential Character Filemanager (OS-9) 
Service Control Function (IN) 
Security Classification Guide 
Synchronization CHannel (GSM, mobile-systems) 
A small, uniform Lisp dialect with clean semantics, developed initially by Guy Steele and Gerald Sussman in 1975. Scheme uses applicative order reduction and is lexically scoped. It treats both functions and continuations as first-class objects. 
Scalable Coherent Interface (ANSI) 
Chess database Shane's Chess Information Database is a chess database application with a graphical user interface. With it you can browse databases of chess games, edit games and search for games by various criteria. Scid uses its own compact and fast database format, but can convert to and from PGN. 
Service Channel IDentifier 
Scientific graphics and data manipulation (Gtk version) SciGraphica is a scientific application for data analysis and technical graphics. It pretends to be a clone of the popular commercial (and expensive) application "Microcal Origin". It fully supplies plotting features for 2D charts. This package is non-Gnome version. 
Scientific graphics and data manipulation (shared files) SciGraphica is a scientific application for data analysis and technical graphics. It pretends to be a clone of the popular commercial (and expensive) application "Microcal Origin". It fully supplies plotting features for 2D charts. This package contains shared files, like pixmaps and examples. 
Scientific graphics and data manipulation (Gnome version) SciGraphica is a scientific application for data analysis and technical graphics. It pretends to be a clone of the popular commercial (and expensive) application "Microcal Origin". It fully supplies plotting features for 2D charts. This package is Gnome version. 
widget for scientific plotting The SciPlot Widget is a widget capable of plotting cartesian or polar graphs, including logarithmic axes in cartesian plots. The widget is subclassed directly from the Core widget class, which means that it does not depend upon any other widget set. It may be freely used with Athena, Motif, or the Open Look/Xview widget sets. (There is optional Motif support that causes the widget to be subclassed from XmPrimitive. See the man page.) Features provided in the widget include automatic scaling, legend drawing, axis labeling, PostScript output, multiple plotted lines, color support, user font specification, dashed lines, symbols drawn at points, logarithmic scales on one or both axes in cartesian plots, and degrees or radians as angles in polar plots. 
Semi-Conductor and Interconnect Technologies 
Lightweight GTK-based Programming Editor GTK-based Programming with with syntax highlighting support for many languages. Also supports folding sections, exporting highlighted text into colored HTML and RTF. 
System Control Language 
a collection of SNMP command line management tools The scli package was written in order to have small and efficient command line utility to monitor and configure network devices and host systems. The scli package is based on the SNMP management protocol and it utilizes a MIB compiler called smidump to generate C stub code. In fact, virtually no SNMP knowledge is required in order to extend the scli programs with new features. In other words, the slogan for this little package is: "After more than 10 years of SNMP, I felt it is time for really useful command line SNMP monitoring and configuration tools. ;-)" (description taken from upstream sources) scli replaces the stools package 
A gtk-based MUD-client. Sclient is a graphical MUD-client for X that tries to be small, fast, and to use as little CPU as possible. 
Segment Control Module 
Service Circuit Modul Mil., Germany 
Service Control Manager (Windows NT) 
Small Core Memory 
Software Configuration Management 
Stream Control Message Protocol (ST2) 
??? [scrambling] (DAT) 
Serial Copy Management System 
Exchange data with Siemens mobile phones SCMxx is a console program that allows you to exchange certain types of data with mobile phones made by Siemens. Some of the data types that can be exchanged are logos, ring tones, vCalendars, phonebook entries, and SMS messages. It works with the S25, S35i, M35i and C35i, SL45, S45 and ME45 and probably others. You need a serial connection (either cable or infrared) to your mobile phone in order to use SCMxx. It basically uses the AT command set published by Siemens (with some other, additional resources). See the website for details. 
Specifications Change Notice 
Sorry, Could Not Resist (slang, Usenet) 
Santa Cruz Operation (manufacturer, Unix) 
SCO Linux
The SCO Group was formerly known as Caldera International. The company now provides a variety of Linux and Unix solutions. SCO is the North American UnitedLinux partner. Caldera OpenLinux 3.1.1 was released January 2002. SCO Linux 4.0, Powered by UnitedLinux was released at the end of 2002. Now it is no longer available, and moved to the historical section on May 28, 2003. Distribution development is not all that active. 
A replacement for Make Scons is able to build files from other files, based on the dependency DAG. 
SCheme Object Oriented Programming System (OOP) 
SCalable Object Processing Environment (Creamware) 
Simple COmmunications Programming Environment (DFUe) 
Supervisory Control Of Program Execution (OS, CDC 6000) 
Interpreter for Adventure International games ScottFree reads and executes TRS-80 format Scott Adams data files. It is possible to run other formats either by writing a loader for that format or a converter to TRS-80 format. Most Adventure International Games are distributed as shareware and are available from 
The Scotty and Tkined Network Management Tools. Scotty is a set of Tcl extensions to retrieve status information about TCP/IP networks. The extensions include commands to send icmp packets a la ping, to lookup hostnames, to query the portmapper and mount daemons. Also included are generic tcp/udp extensions as well as commands to query the domain name service for a, ptr, hinfo, mx and soa records and commands to query ntp server. log messages can be written by using the syslog command. The perhaps most interesting extension is an interface to the SNMPv1, SNMPv2C and SNMPv3 protocols. Tkined is a small but nice network management station. 
Secondary Communications Processors 
secure copy (remote file copy program) 
Service Control Point (OSI) 
Standard Configuration Profile (MODEM) 
System Control Program (OS) 
Single Channel Per Carrier 
Seattle Computer Products Dis Operating System (OS, DOS, MS-DOS, predecessor), "SCP-DOS" 
Selective Call Rejection 
Sustainable Cell Rate (UNI, ATM, VBR) 
screaming tty
n. [Unix] A terminal line which spews an infinite number of random characters at the operating system. This can happen if the terminal is either disconnected or connected to a powered-off terminal but still enabled for login; misconfiguration, misimplementation, or simple bad luck can start such a terminal screaming. A screaming tty or two can seriously degrade the performance of a vanilla Unix system; the arriving "characters" are treated as userid/password pairs and tested as such. The Unix password encryption algorithm is designed to be computationally intensive in order to foil brute-force crack attacks, so although none of the logins succeeds; the overhead of rejecting them all can be substantial. 
A GNOME website development environment SCREEM is a tag-based Web page editor which aims not only to aid in creating Web pages, but also to provide useful site maintenance facilities, including automatic link updating and site upload facilities. SCREEM has more than just the usual HTML tags, with features for including Javascript, PHP, cascading style sheets, etc within your site. It is written for use with the GNOME ( desktop environment 
A terminal multiplexor with VT100/ANSI terminal emulation. screen is a terminal multiplexor that runs several separate "screens" on a single physical character-based terminal. Each virtual terminal emulates a DEC VT100 plus several ANSI X3.64 and ISO 2022 functions. Screen sessions can be detached and resumed later on a different terminal. Screen also supports a whole slew of other features. Some of these are: configurable input and output translation, serial port support, configurable logging, multi-user support, and utf8 charset support. 
n. [Atari ST demoscene] One demoeffect or one screenful of them. Probably comes from old Sierra-style adventures or shoot-em-ups where one travels from one place to another one screenful at a time. 
screen manager with VT100/ANSI terminal emulation 
The screen utility allows you to have multiple logins on just one terminal. Screen is useful for users who telnet into a machine or are connected via a dumb terminal, but want to use more than just one login. Install the screen package if you need a screen manager that can support multiple logins on one terminal. 
screen name
n. A handle sense 1. This term has been common among users of IRC, MUDs, and commercial on-line services since the mid-1990s. Hackers recognize the term but don't generally use it. 
Supercomputer Computations Research Institute (org., USA, HPC) 
Document Production System Scribe is a programming language designed for the production of electronic documents. With Scribe one can: - Produce HTML web pages. - Produce PS files. - Produce Info files (documentation files suitable for Emacs). - Produce man pages (Unix documentation format). One may also: - Translate Texinfo files into HTML. - Upload Scribe page on an Apache server and dynamically expanse it into HTML when loaded by client. (This feature is not built for the current Debian version.) Scribe is implemented in Bigloo Scheme. 
a free software desktop publishing program Scribus is a free software layout program for GNU/Linux similar to a couple of proprietary programs from Adobe and Quark. Unlike other programs Scribus uses only Type1 fonts of the X-Server. Therefore there is no fiddling around with installing extra fonts. For this reason the number of fonts is a little bit limited, but you can be sure that your monitor shows exactly the same as the printed output is. Documentation for this package is available in either French, German or English. Please choose your appropriate scribus-doc-XX documentation package. 
German documentation for Scribus Scribus is a free software layout program for GNU/Linux similar to a couple of proprietary programs from Adobe and Quark. These are the documentation files in German. 
English documentation for Scribus Scribus is a free software layout program for GNU/Linux similar to a couple of proprietary programs from Adobe and Quark. These are the documentation files in English. 
French documentation for Scribus Scribus is a free software layout program for GNU/Linux similar to a couple of proprietary programs from Adobe and Quark. These are the documentation files in French. 
A set of commands stored in a file. Used for automated, repetitive, execution. (Also, see RC File.) 
An executable plain text file; string of commands written to a file and run as one logical program. 
make typescript of terminal session 
Programs written to take advantage of a particular exploit. Key point: Elite hackers write scripts, script-kiddies run scripts. Misunderstanding: A lot of "scripts" are written in scripting languages like PERL, but a lot are distributed in C/C++ source form as well. Contrast: 0-day exploit. 
A free electronic cataloging system for documentation. It stores metadata specified by the (Open Source Metadata Framework) as well as certain metadata extracted directly from documents (such as the table of contents). It provides various functionality pertaining to this metadata to help browsers, such as sorting the registered documents or searching the metadata for documents which satisfy a set of criteria. 
ScrollKeeper is a cataloging system for documentation. It manages documentation metadata (as specified by the Open Source Metadata Framework (OMF)) and provides a simple API to allow help browsers to find, sort, and search the document catalog. It can also communicate with catalog servers on the Net to search for documents which are not on the local system. 
An advanced ircII-based IRC client ScrollZ is advanced IRC client based on ircII code. It adds features normally found in ircII scripts like Toolz, PhoEniX, GargOyle or Lice. The main difference between these scripts and ScrollZ is the code. Where ircII scripts take a lot of disk and memory space and run slow, ScrollZ only takes a couple of extra kilobytes compared to stock ircII client yet runs faster than any ircII script. This was accomplished by using C code instead of ircII scripting language. This reduces memory and CPU usage and code tends to run way faster. 
command line screen capture utility scrot (SCReen shOT) is a simple commandline screen capture utility that uses imlib2 to grab and save images. Multiple image formats are supported through imlib2's dynamic saver modules. 
Scrudgeware is currently under development. As a GNU/Linux distribution, ScrudgeWare is being designed with several goals in mind. First and foremost is to be built 100% from GPL (or other freely licensed) software. Second, NO BLOAT. Scrudgeware will try to build a simple ("bare bones") system on which the user can add any software they choose. 
Silicon Controlled Switch 
Singapore Computer Society (org., Singapur) 
Small Computer System 
SNA Character String (IBM) 
Switch Control Software (ForeRunner, ATM) 
[systimax] Structured Cabling System (AT&T) 
Signal Computing System Architecture 
Sun Common SCSI Architecture (Sun) 
A `scheme' interpreter designed for writing system programs. Scsh has a high-level process notation for doing shell-script like tasks: running programs, establishing pipelines and I/O redirection. Scsh embeds this process notation within a full Scheme implementation. The process notation is realized as a set of macro definitions, and is carefully designed to allow full integration with standard Scheme code. Scsh isn't Scheme-like; it is Scheme. At the scripting level, scsh also has an Awk design, also implemented as a macro that can be embedded inside general Scheme code. Scsh additionally provides the low-level access to the operating system normally associated with C. The current release provides full access to POSIX, plus important non-POSIX extensions, such as complete sockets support. "Complete POSIX" means: fork, exec & wait, sockets, full read, write, open & close, seek & tell, complete file-system access, including stat, chmod/chgrp/chown, symlink, FIFO & directory access, tty & pty support, file locking, pipes, select, file-name pattern-matching, time & date, environment variables, signal handlers, and more. Please be aware that several of the other scheme implementations being distributed as Debian GNU/Linux packages also provide much of the similar system programming functionality. It is wisest to try them all and explore. 
see small computer systems interface (SCSI). 
Small Computer Systems Interface (SCSI) 
SCSI disks
SCSI (pronounced scuzzy) stands for Small Computer System Interface. SCSI is a ribbon, a specification, and an electronic protocol for communication between devices and computers. Like your IDE ribbons, SCSI ribbons can connect to their own SCSI hard disks. SCSI ribbons have gone through some versions to make SCSI faster, the latest ``Ultra-Wide'' SCSI ribbons are thin, with a dense array of pins. Unlike your IDE, SCSI can also connect tape drives, scanners, and many other types of peripherals. SCSI theoretically allows multiple computers to share the same device, although I have not seen this implemented in practice. Because many UNIX hardware platforms only support SCSI, it has become an integral part of UNIX operating systems. SCSIs also introduce the concept of LUNs (which stands for Logical Unit Number), Buses, and ID. These are just numbers given to each device in order of the SCSI cards you are using (if more than one), the SCSI cables on those cards, and the SCSI devices on those cables--the SCSI standard was designed to support a great many of these. The kernel assigns each SCSI drive in sequence as it finds them: /dev/sda, /dev/sdb, and so on, so these details are usually irrelevant. An enormous amount should be said on SCSI, but the bare bones is that for 90% of situations, insmod <pci-scsi-driver> is all you are going to need. You can then immediately begin accessing the device through /dev/sd? for disks, /dev/st? for tapes, /dev/scd? for CD-ROMs, or /dev/sg? for scanners. [Scanner user programs will have docs on what devices they access.] SCSIs often also come with their own BIOS that you can enter on startup (like your CMOS). This will enable you to set certain things. In some cases, where your distribution compiles-out certain modules, you may have to load one of sd_mod.o, st.o, sr_mod.o, or sg.o, respectively. The core scsi_mod.o module may also need loading, and /dev/ devices may need to be created. 
Add or remove SCSI devices by rescanning the bus. scsiadd allows you to add or remove SCSI devices without having to restart the computer. This is *NOT* a substitute for powering down to connect or disconnect hardware unless it's specifically designed to be hot swappable. Use it to enable the external SCSI drive you only use occasionally so is powered off when the machine first boots, or to rescan the bus after moving hot-swap drives around. scsiadd will also try to prevent you from doing anything to disrupt drive names that are in use. Similar functionality is available by echoing text to /proc/scsi/scsi 
Collection of tools for SCSI hardware management This package is a collection of tools for manipulating SCSI hardware: scsiinfo: displays SCSI drive low-level information and modifies SCSI drive settings, scsidev: makes permanent SCSI LUN -> devicename connections, scsifmt: low-level SCSI formatter, sraw: benchmarks raw SCSI I/O rates bypassing the buffer cache, scsistop: low-level SCSI drive start/stop program, scsi-spin: program to manually spin up and down a SCSI device. Be aware that these tools require some knowledge of what are they doing to be used properly, not causing damage to your system. 
Sun Community Source License (Sun) 
Standard Compression Scheme for Unicode (Unicode) 
Subroutine Call Table 
Stream Control Transmission Protocol (IETF) 
Secondary Clear to Send 
Selector Control Unit 
System Control Unit (CPU, POWER) 
Specialized Communications eXchange 
Scyld Beowulf
The Scyld Beowulf Cluster Operating System software distribution is the second generation of Beowulf clustering. The system advances clustering technology, providing significant benefits over existing systems. A 'special purpose/mini' distribution. 
Self-Describing [file] (HP) 
Starting Delimiter (FDDI, Token Ring) 
Structured Design (CASE) 
Super Density [disk] (CD, Toshiba, Time Warner) 
Screen Design Aid (IBM, ADT) 
Shared Data Architecture 
Software Design Automation 
Source Data Automation 
Swappable Data Area (DOS) 
System Display Architecture 
Systems Design Automation Vendor 
Sample Data Collection 
Secure Digital Card (PDA) 
Software Development Control [system] (CMU, CM) 
Software Distribution Center 
Small Device C Compiler SDCC is a C compiler for the Intel MCS51 family, AVR and Z80 microcontrollers. The package includes the compiler, assemblers and linkers, and a core library. 
Micro-controller simulator for SDCC uCsim is a microcontroller simulator. It is extensible to support different microcontroller families. Currently it supports Intel MCS51 family. Atmel AVR core is working now and Z80 support is under development. This package also include the source debugger for SDCC. 
Stand-alone Dedicated Control CHannel (GSM, DCCH, mobile-systems) 
Secondary Data Carrier Detect 
Software Design Document 
Super Density Disk (Toshiba, Time Warner, ...) 
Southwest research Data Display and Analysis System 
Shielded Distributed Data Interface (FDDI, STP) 
Software Development Environment 
Screen Definition Facility 
Simple Document Parser SDF (Simple Document Format) is a freely available document development system which generates high quality outputs in a variety of formats from a single source. The output formats supported include PostScript(tm), PDF, HTML, plain text, POD, man pages, LaTeX, MIF, SGML, Windows(tm) help, RTF, MIMS F6 help and MIMS HTX help. If the idea of specifying documents in a logical manner via a simple markup language sounds appealing, SDF may be useful to you. 
Standard Data Format 
System Dialog Facility (BS2000) 
Synchronous Digital Hierarchy (FDDI, ATM) 
Single Document Interface 
Slovensko Drustvo Informatika (org., Slowakien) 
Source Data Information 
Standard Data Interface 
Standard Disk Interconnect 
Standard Disk Interface 
Standard Drive Interface 
Storage Device Interconnect 
Storage Device Interface (Novell, Netware, SMS) 
Super Data Interchange 
Emacs-Lisp program to view dictionaries Sdic is an emacs interface to English-Japanese dictionaries and Japanese-English dictionaries. 
GENE95 dictionaries for sdic (installer) This package installs the GENE95 English-Japanese dictionary to use with sdic. Although this package can install a Japanese-English dictionary derived the GENE95 English-Japanese dictionary, I would prefer to use the Japanese-English dictionary installed through sdic-edict. Before installing this package, you have to get gene95.lzh or gene95.tar.gz or gene95.tar.bz2. You can get these files from 
SGML Document Interchange Format (SGML, ISO, IS 9069) 
System Independent Data Format (Novell, SMS) 
find differences between two files and merge interactively 
Selective Dissemination of Information onLINE 
Single [RAS] Dual Inline Memory Module (DIMM, RAS), "S-DIMM" 
Switched Digital Integrated Service 
Software Development Kit (MS) 
Simple Direct Media Layer (SDL) is a cross-platform multimedia library designed to provide fast access to the graphics frame buffer and audio device. 
Specification and Description Language (CCITT) 
System Design Language 
script to get information about the installed version of SDL 
Synchronous Data Link Control (IBM, SNA) 
Specification and Description Language / Graphical Representation, "SDL/GR" 
Synchronous Data Link Control Conversion (SNA, IBM) 
Standard Device Level Protocol 
??? [benchmark] (DB, SPEC) 
Short Data Message 
Spatial Data Management 
Storage Device Migration Aid 
Secure Digital Music Initiative (org.) 
SCSI Device Management System (BIOS) 
Software Defined Network 
Software Distribution Net (FidoNet) 
Secure Data Network Service / System (USA, mil.) 
Selective Dynamic Overload Controls 
Software Dynamics Operating System (OS) 
Service Delivery Point 
Session Description Protocol (RFC 2327) 
Software Development Plan 
Specialized Data Point (IN) 
Streaming Data Procedure 
An Mbone Conference Scheduling and Booking System.(SDR) Sdr is a Session Directory designed for announcing and scheduling multimedia conferences on the Mbone - the multicast backbone of the Internet. Sdr is loosely modelled on sd - LBL's Mbone Session Directory. Sdr extends the sd model in a number of ways, particularly in the degree of detail about the timing and resources required by a conference, and in the provision of a much more flexible interface for querying the existence of sessions or of any sessions that may potentially clash with a new session. 
Service DiRectory [tool] (SAP) 
Shared Data Research 
Signal-to-Distortion Ratio 
Single Data Rate (GDR) 
Store Data Register (IC) 
Streaming Data Request 
System Design Review 
Synchronous Dynamic Random Access Memory (RAM, DRAM, IC, Intel, Samsung) 
Source Demand Routing Protocol 
Single Data Rate Synchronous Dynamic Random Access Memory (DRAM, RAM, IC), "SDR-SDRAM" 
SubDivision Surfaces (3D) 
Switched Data Service 
Synchronous Data Set 
Sysops Distribution System (BBS) 
Switched Digital Services Applications Forum (org.) 
San Diego Supercomputer Center (org., USA) 
Synchronous Data Set Controller 
San Diego Supercomputer Center NETwork (network, USA), "SDSCnet" 
Single line Digital Subscriber Line (DSL) 
Slotted Digital Sense Multiple Access (MODACOM), "S-DSMA" 
Secure Data System Network 
Software Development Tools 
Source Data Terminal 
Systems Development Tool 
[PPP] Serial Data Transport Protocol (PPP, RFC 1963) 
Service Data Unit (OSI) 
Software Distribution Utilities (IBM, HP) 
Switched Digital Video (VOD) 
Storage Data ACceleration (ATAPI, WD, CD, DVD) 
Service / Systems Engineer 
Software Engineering 
Standard / Special Edition (IBM, OS/2) 
Switching Element 
System Extension 
Self-Extracting Archive 
Society for Electronic Access (org.) 
Standards Eastern Automatic Computer 
A Gnome front end for GnuPG Seahorse is a Gnome front end for GnuPG - the Gnu Privacy Guard program. It is a tool for secure communications and data storage. Data encryption and digital signature creation can easily be performed through a GUI and Key Management operations can easily be carried out through an intuitive interface. 
Simple and Efficient Adaptation Layer (ATM) 
Service Element Access Point 
Search Engine
A (usually web-based) system for searching the information available on the Web. Some search engines work by automatically searching the contents of other systems and creating a database of the results. other search engines contains only material manually approved for inclusion in a database, and some combine the two approaches. 
search path
A list of directories in which a given user's commands may be found. Each time the user enters a command at the keyboard, the shell searches the list to find the command. You can execute only those commands that belong to the directories in your search path. 
Fly aircraft to Search (for) and Rescue people in distress. Tired of scores indicating things destroyed or lives snuffed? Try something different -- fly a helicopter around and rescue people in distress. If you were in trouble wouldn't you want someone to rescue you? This game is intended for players of all audiences, but especially for mature players who want to get away from the violence and still retain a level of precise challenge. Flight difficulty can be lowered for beginners (regardless of mission type), and graphics minimized to suit slower computers (minimum Pentium 166 with no graphics acceleration). This package has been configured to depend on libjsw for joystick support and libY2 for sound support. However, neither a joystick nor sound support is necessary to enjoy the game. 
search Debian & Usenet archives & Packages files searchgoo searches Google's Usenet archives; similar in function to dejasearch. searchdeb & searchgeo search the Debian & Geocrawler mailing list archives. Geocrawler archives Debian mailing lists and many others. The advantage these have over the web page forms is they download message bodies unattended. ppack parses the Packages, available & status files to show orphans, packages that need updating, those that belong to a chosen maintainer, anomalies in package status, popcon results and more. Useful for keeping track of chroot status. diffdirs shows the files that are different in two directories, tarballs, zip files, debs or any combination of two of these. 
SEquentiel Couleur Avec Memoire 
Severely Errored Cell Block (UNI) 
Single Edge Connector Case (CPU) 
secondary storage
A nonvolatile storage medium such as a disk drive that stores program instructions and data even after you switch off the power. Synonymous with auxiliary storage. See primary storage. 
A Tcl/Tk GUI for SSH and SCP. SecPanel serves as a graphical user interface for managing and running SSH (Secure Shell) and SCP (Secure Copy) connections. SecPanel is not a new implementation of the Secure Shell protocol or the ssh software-suite. SecPanel sits on top of SSH software-suites and supports the commercial SSH and the OpenBSD's free SSH implementation. You may get information about these programs at and at respectively. 
PAM security policy configuration tool This tool allows you to manipulate the PAM configuration files for each "service" you have created to use PAM. 
Views and sets PAM security policies. 
A segment of one of the concentric tracks encoded on a floppy or hard disk during a low-level format. In IBM PC-compatible computing, a sector usually contains 512 bytes of information. See cluster. 
The primary measuring unit of a storage disk upon which data is stored. 
Secure Shell (SSH)
A protocol for secure terminal access to remote computer systems. SSH uses key-based cryptography to securely authenticate and transmit session data from client to host. 
Securepoint Firewall & VPN Server
The Securepoint Firewall & VPN server is a high end firewall and VPN solution for protecting your Internet gateway. Securepoint can also be used with existing firewalls and to protect interconnected locations or divisions and lets you create and manage VPN tunnels. Languages supported: English, German, Russian, and Korean. A 'secured' distribution. 
Security Certificate
A chunk of information (often stored as a text file) that is used by the SSL protocol to establish a secure connection. 
security through obscurity
(alt. `security by obscurity') A term applied by hackers to most OS vendors' favorite way of coping with security holes -- namely, ignoring them, documenting neither any known holes nor the underlying security algorithms, trusting that nobody will find out about them and that people who do find out about them won't exploit them. This "strategy" never works for long and occasionally sets the world up for debacles like the RTM worm of 1988 (see Great Worm), but once the brief moments of panic created by such events subside most vendors are all too willing to turn over and go back to sleep. After all, actually fixing the bugs would siphon off the resources needed to implement the next user-interface frill on marketing's wish list -- and besides, if they started fixing security bugs customers might begin to expect it and imagine that their warranties of merchantability gave them some sort of right to a system with fewer holes in it than a shotgunned Swiss cheese, and then where would we be? Historical note: There are conflicting stories about the origin of this term. It has been claimed that it was first used in the Usenet newsgroup in comp.sys.apollo during a campaign to get HP/Apollo to fix security problems in its Unix-clone Aegis/DomainOS (they didn't change a thing). ITS fans, on the other hand, say it was coined years earlier in opposition to the incredibly paranoid Multics people down the hall, for whom security was everything. In the ITS culture it referred to (1) the fact that by the time a tourist figured out how to make trouble he'd generally gotten over the urge to make it, because he felt part of the community; and (2) (self-mockingly) the poor coverage of the documentation and obscurity of many commands. One instance of deliberate security through obscurity is recorded; the command to allow patching the running ITS system (escape escape control-R) echoed as $$^D. If you actually typed alt alt ^D, that set a flag that would prevent patching the system even if you later got it right. 
Secure Virtual Private Network (secvpn) builds a VPN based on ssh and ppp as described in the Linux VPN HOWTO. (Please look there for further informations) All necessary routing on the secvpn hosts will be done by secvpn. Secvpn will try to reestablish broken connections automatically. 
Sed (Stream EDitor) is a stream or batch (non-interactive) editor. Sed takes text as input, performs an operation or set of operations onthe text, and outputs the modified text. The operations that sed performs (substitutions, deletions, insertions, etc.) can be specified in a script file or from the command line. 
Stream EDitor (Unix) 
The GNU sed stream editor. sed reads the specified files or the standard input if no files are specified, makes editing changes according to a list of commands, and writes the results to the standard output. 
Standardisiertes Einheitliches DatenAustauschSystem (EDI) 
execute programs via entries in the mailcap file 
Societe des Electriciens et Electroniciens (org., France) 
Software Engineering Environments 
Systems Equipment Engineering 
In a disk drive, to locate a specific region of a disk and to position the read/write head so that the computer can retrieve data or program instructions. 
seek time
In a secondary storage device, the time that it takes the read/write heads reach the correct location on the disk. See access time. 
a satellite location program Seesat5 uses the NORAD sgp4 algorithm to compute the location of a satellite. Many different filtering methods are provided by Seesat5 so that only those satellites that might actually be viewed are presented in the report. This report includes bearing and elevation with respect to the observer's location as well as other information of interest to the observer. Although an observer would find no use for it, the program can be made to report the location even when it is below the horizon. For radio satellites like the Oscar series knowing when it comes above the horizon is some of the interesting information this program can provide. 
Source Explicit Forwarding 
Severely Errored Framing Seconds (DS1/E1, DS3/E3) 
segmentation fault
An error in which a running program attempts to access memory not allocated to it and core dumps with a segmentation violation error. 
segmentation fault
n. [Unix] 1. [techspeak] An error in which a running program attempts to access memory not allocated to it and core dumps with a segmentation violation error. This is often caused by improper usage of pointers in the source code, dereferencing a null pointer, or (in C) inadvertently using a non-pointer variable as a pointer. The classic example is: int i; scanf ("%d", i); /* should have used &i */ 2. To lose a train of thought or a line of reasoning. Also uttered as an exclamation at the point of befuddlement. 
Structured Exception Header 
Software Engineering Institute 
Fullscreen file-selection and execution tool sel displays a listing of files like a file-manager. You can move around using the arrow-keys and run a command given on the command-line on the selected file with the <RETURN> - key. If you've installed the terminfo- library delivered with ncurses, sel will use colors. 
Software Engineering Laboratory 
Standard Elektrik Lorenz [ag] (manufacturer) 
Insert X-Face mail header with viewing and selecting a bitmap. Insert X-Face Mail/News header with viewing and selecting a bitmap. 
Select a window manager at X startup selectwm is a simple but robust program that will let you pick a window manager (or other executable) to run at X startup, and optionally after a window manager exits. It uses the GTK+ toolkit, and includes options like a timer to start the default window manager, and modification of the window manager list from within selectwm. 
South East London - High Performance Computing [centre] (org.), "SEL-HPC" 
Policy config files and management for NSE Security Enhanced Linux /etc/selinux contains the policy files, checkpolicy will check the policy. 
Server Enhancement Module 
Standard Error of the Mean 
A lexer, parser-generator, and parser written in elisp The Semantic Bovinator's goal is to provide an intermediate API for authors of language agnostic tools who want to deal with languages in a generic way. It also provides a simple way for Mode Authors, who are experts in their language, to provide a parser for those tool authors, without knowing anything about those tools. The Semantic Bovinator is made up of these important pieces: - lexer: Converts a language into a token stream - parser: Converts a token stream into a stream of nonterminals defined by the language. - parser-generator: Converts a language definition into a table usable by the parser. (Written using the Semantic Bovinator) - Language Definitions: Parsers already existing for the parser generator language (Bovine Normal Form), Emacs Lisp, and C. - speedbar browser: Code for browsing a generated nonterminal list with Speedbar. - Documentation generator: Identifies inline documentation in source code, and can convert it to texinfo. It can also create inline documentation. 
Library to provide MIME feature for GNU Emacs. SEMI is a library to provide MIME feature for GNU Emacs. MIME is a proposed internet standard for including content and headers other than (ASCII) plain text in messages. 
Simple Asynchronous File Transfer Sendfile is an asynchronous file transfer service for the Internet, like the sendfile facility in Bitnet: Any user A can send files to another user B without B being active in any way. The existing standard file transfer (ftp) is a synchronous service: The user must have access to an account on the sending and on the receiving site, too. Sendfile for Unix, which is an implementation of the SAFT protocol (Simple Asynchronous File Transfer) now offers you a true asynchronous file transfer service for the Internet. Virtually any form of file can be sent, including encrypted ones. The SAFT protocol will be submitted as an RFC in the near future. 
A commandline tool to allow sending arbitrary IP packets. SendIP has a large number of command line options to specify the content of every header of a RIP, TCP, UDP, ICMP or raw IPv4 and IPv6 packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too. 
A powerful, efficient, and scalable Mail Transport Agent. Sendmail is an alternative Mail Transport Agent (MTA) for Debian. It is suitable for handling sophisticated mail configurations, although this means that its configuration can also be complex. Fortunately, easy thing can be done easily, and complex things are possible, even if not easily understood ;) Sendmail is the *ONLY* MTA with a Turing complete language under the covers ! Sendmail provides Security and SPAM/UCE/UBE protection via several means: - STARTTLS(SSL) RFC2487 encryption for mail reception/delivery. - STARTTLS(SSL) authentication (certificate based) for access/relay control. - SMTP AUTH (SASL/PAM) authentication for access/relay control. - ACCESS database (by IP/host) for access/relay control. - Use of varied Realtime Blackhole Lists (RBL) to prevent access. - Integration of LOGCHECK rules to fine-tune logging. - Inboard POSIX Regular Expression processing of *all* headers. - Ability (via MILTER) to scan/change headers *and* body of *ALL* mail A site may utilize zero, one, or more MILTERs. - Reduced SUID exposures by running SGID smmsp/mail where possible. Sendmail provides Performance and Scalability by: - Allowing multiple queues, with the ability to tune both interval and queue runners on a queue by queue basis. - Providing (a Debian exclusive) an easy to configure means of queue-aging to improve throughput by not continually retrying failed deliveries. - Allowing most all maps/databases to be obtained via LDAP; reducing the number of used databases and simplifying the maintenance of Sendmail. - Reducing the file I/O where possible by buffering files in memory. Sendmail provides site enhanced site configuration/customization by: - Allowing the listener (usually port 25) to run as a daemon or via INETD. - Allowing the queue runner (mail delivery) to run as a daemon or via CRON. - Automagically updating configuration and databases on upgrades. - Providing a Turing complete language for site customization of mail handling. - Providing a means (MILTER) for a site to scan/change all email - both incoming and outgoing. A site can write their own MILTER, or may use any of those found on internet. To write your own MILTER, you'll need to install the optional milter-dev package. - Providing extensive documentation via the sendmail-doc (optional) package. - Providing an inboard Mail Delivery Agent (MDA) (mail.local), but supporting procmail, mailagent, maildrop, or deliver automatically if installed. Sendmail will also deliver to anythings else (cyrus, etc) if asked to. Sendmail includes *no* Mail User Agents (MUA), you'll have to pick from the plethora of available MUAs (pine, mutt, vm, etc.) This package supports REGEX, DB, NIS, NIS+, LDAP, DNS, HESIOD maps, and has enabled TCPWrappers, IPv6, LockFile, SMTP AUTH(SASL), STARTTLS(SSL). 
Sendmail is a popular e-mail server package. By most estimates, well over half of all e-mail flowing through the Internet goes through a Sendmail system. Sendmail is open-source software. Key point: Sendmail is an MTA (Message Transfer Agent). This means that Sendmail only transfers e-mail to other MTAs. Client programs (like Outlook, Eudora, Pine) will use SMTP to hand e-mail to Sendmail for transmission over the Internet, but they can't use SMTP to read e-mail. Instead, when Sendmail receives e-mail destined for the local machine, it must hand it off to some other software package. In the most common situation, Sendmail will save incoming messages in mbox format to /var/spool/mail for each user, and other programs will allow users to retrieve e-mail from those files. History: In 1989, Morris Worm exploited Sendmail bugs as one technique to spread itself. Sendmail is an ancient software package on the Internet, which results in a high-degree of complexity for backwards compatibility. 
Sendmail sends a message to one or more recipients, routing the message over whatever networks are necessary. Sendmail does inter-network forwarding as necessary to deliver the message to the correct place. Sendmail is not intended as a user interface routine; other programs provide user-friendly front ends; sendmail is used only to deliver pre-formatted messages. 
The Sendmail program is a very widely used Mail Transport Agent (MTA). MTAs send mail from one machine to another. Sendmail is not a client program, which you use to read your email. Sendmail is a behind-the-scenes program which actually moves your email over networks or the Internet to where you want it to go. If you ever need to reconfigure Sendmail, you will also need to have the package installed. If you need documentation on Sendmail, you can install the sendmail-doc package. 
An easy-to-use Unix tool for sending pages. Sendpage is a front end to the PET protocol used by many paging systems. PET is also knows as IXO or TAP. It can dial up your paging service and send alphanumeric pages. Other software (such as mon) can be set up to automatically send pages, email can be forwarded to your pager, etc. Sendpage is licensed under the GPL. 
sensible editing and paging 
sensible editing and paging 
GNOME applet displaying system's health status Sensor Sweep is a GNOME panel applet that monitors your computers sensors through the lm_sensors kernel modules. 
Hardware sensor information logging daemon Lm-sensors is a hardware health monitoring package for Linux. It allows you to access information from temperature, voltage, and fan speed sensors. It works with most newer systems. This package contains a daemon that logs hardware health status to the system log with optional warnings on potential system problems. You will need lm-sensors and i2c kernel modules to use this package. 
Sentry Firewall
Sentry Firewall CD-ROM is a Linux based bootable CD-ROM suitable for use as an inexpensive and easy to maintain Firewall or IDS (Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk or a local hard drive. Version 1.2.0 was released March 27, 2002. Version 1.4.0-beta2 was released October 25, 2002. A CD-based distribution. 
Someone Else's Problem (slang, Usenet, IRC) 
Secure Electronic Payment Protocol (banking, IBM, Netscape, GTE) 
prints a sequence of numbers 
Structured English QUEry Language (IBM, DB, SQL, predecessor) 
Allows network connections to serial ports This daemon allows telnet and tcp sessions to be established with a unit's serial ports. Combined with a terminal emulation like xterm or the Linux console, this can be a very simple means of communicating with routers, other systems' serial consoles and other equipment with a serial port. This is remarkably similar to some Cisco router's reverse telnet function. 
serial installation
An installation of Red Hat Linux done via serial communication port. 
serial line internet protocol (SLIP)
A network connection standard that uses the Internet Protocol (TCP/IP) over a serial line. SLIP makes it possible for a computer to communicate with other computers via a dial-up connection. 
serial mouse
A pointing device that connects to a serial port. 
serial port
9-pin or 25-pin socket used to connect several devices, including mice and modems. 
The series package is a general iteration library for Lisps. It can do anything loop can, but in a more functional way. 
Little hooks on the ends of characters. For example, the letter i in a font such as Times Roman has serifs protruding from the base of the i and the head of the i. Serif fonts are usually considered more readable than fonts without serifs. There are many different types of serif fonts. 
Structured Entity Relationship Model (DB, ERM) 
dict server with full unicode support serpento is a dict server written in python. If you want to run the server, you need also dictionary files. You can use those provided as debian packages (dict, dict-gcide, dict-wn, dict-jargon, dict-foldoc etc.) See /usr/share/doc/serpento/README.debian for info. 
Security Emergency Response Team (org., Australia, Internet) 
A computer system that manages files, services, and access to resources on a network. 
A computer, or a software package, that provides a specific kind of service to client software running on other computers. The term can refer to a particular piece of software, such as a WWW server, or to the machine on which the software is running, e.g. "Our mail server is down today, that's why e-mail isn't getting out." A single server machine can (and often does) have several different server software packages running on it, thus providing many different servers to clients on the network. Sometimes server software is designed so that additional capabilities can be added to the main program by adding small programs known as servlets. 
A program which provides some service to other (client) programs. The connection between client and server is normally by means of message passing, often over a network, and uses some protocol to encode the client's requests and the server's responses. 
n. A kind of daemon that performs a service for the requester and which often runs on a computer other than the one on which the requestor/client runs. A particularly common term on the Internet, which is rife with `web servers', `name servers', `domain servers', `news servers', `finger servers', and the like. 
server message block (SMB)
A protocol developed to facilitate the sharing of files, printers, and other resources on a local network. Samba is a Linux-compatible implementation of the SMB protocol. 
Server optimized Linux
SoL (Server optimized Linux) is a Linux distribution completely independent from other Linux distributions. It was built by antitachyon from the original source packages and is optimized for heavy-duty server work. It contains all common server applications, and features XML boot and script technology that makes it easy to configure and make the server work. SoL 13.37 was released April 22, 2002 (initial Freshmeat announcement). Version 16.00 was released March 17, 2003. A diskless version, SoL-diag 1.1, was introduced March 3, 2003. A desktop version, SoL-Desktop 0.2, was released March 27, 2003. 
Serverdisk diskette distro
Serverdisk diskette distro is a Linux floppy disk distribution which includes FTP and HTTP servers. Just a small server, not intended to be a rescue disk or standalone firewall. The initial version, 0.1, was released September 19, 2002. A floppy-based distribution. 
A small computer program designed to be add capabilities to a larger piece of server software. Common examples are "Java servlets", which are small programs written in the Java language and which are added to a web server. Typically a web server that uses Java servlets will have many of them, each one designed to handle a very specific situation, for example one servlet will handle adding items to a "shopping cart", while a different servlet will handle deleting items from the "shopping cart." 
Security Enabling Services (IBM) 
Severely Errored Seconds (DS1/E1) 
Synergetische Erkennung mittels Standbild, Akustik und Motorik (IIS) 
A complete interaction period between the user and the operating system, from login to logoff. 
One complete interaction between a user and the Linux system, from login to logout. 
manage utmp/wtmp entries for non-init clients 
Secure Electronic Transactions (IBM, Visa, MS, IBM, Mastercard, Netscape, banking) 
Software Engineering Technology 
Standard d'Echange et de Transfert (AFNOR, France) 
Cyrix/IBM 5x86/6x86 CPU configuration tool Allows one to modify the internal configuration registers in the 5x86 and 6x86 CPU. These include specifying non-cacheable memory areas (important for e.g. graphics cards), I/O delays, cache write policy (WB/WT), write-gathering, and also enable an automatic standby mode where a CPU "halt" instruction cuts down power by a factor of 70 (from 20 Watts to 0.3 Watts for the 6x86 P133+) when the CPU is idle. Especially the CPU power reduction cuts down on most temperature-related problems on many motherboards. 
Systems Engineering and Technical Assistance 
Control the behaviour of your cdrom device This program allows you to control the behaviour of your Linux cdrom player. You'll need a cdrom device that complies to the new interface defined in linux/Documentation/cdrom/cdrom-standard.tex. For kernel 2.0 this is only the cm206 drive, for kernel 2.1 this includes IDE and SCSI drives. You can control: auto close, auto eject, medium type checking and tray locking. You can get information on the volume name of cdroms and other data, and you can set the speed of your drive and choose a disc from a jukebox. In order to fully exploit the possibilities, you'll need libc6 and a recent version of the the linux kernel, but you will get decent error behaviour in return. Expect a message "No medium found" if you attempt to mount an empty drive or "Wrong medium type" if you try to mount an audio disc, instead of a whole load of kernel error messages. The source of this package may be an example for cdrom player program developers that wish to exploit the features of the new cdrom interface. 
sets user-provided floppy disk parameters TQ 
SETI@Home Client (install package) SETI@home is a scientific experiment that harnesses the power of hundreds of thousands of Internet-connected computers in the Search for Extraterrestrial Intelligence (SETI). You can participate by running a free program that downloads and analyzes radio telescope data. There's a small but captivating possibility that your computer will detect the faint murmur of a civilization beyond Earth. SETI@Home is only distributed in binary form and the correct unix tar ball for your architecture has to be downloaded from and placed in $TMPDIR (or /tmp if $TMPDIR is not defined). This installer package will automagically wget (if wget is installed) the right tarball and install the program, if the target debian linux architecture is one of the following: x86, alpha, sparc, powerpc or hppa. 
load kernel scancode-to-keycode mapping table entries 
SEt Theory Language (New York Uni.), "SetL" 
set the keyboard leds 
define the keyboard meta key handling 
a command mode mixer. Got bored resetting soundcard manually after every reboot? Here is a small utility which can help you to avoid that. The whole source is setmixer.c. 
Secure Electronic Transactions Process 
Stream Environment Transport Protocol 
configure PCI devices 
Controls configuration of serial ports. Set and/or report the configuration information associated with a serial port. This information includes what I/O port and which IRQ a particular serial port is using. This version has a completely new approach to configuration, so if you have a setup other than the standard ttyS0 and 1, you will have to get your hands dirty. By default, only COM1-4 are configured by the kernel, using IRQ 3 and 4. If you have other serial ports (such as an AST Fourport card), or if you have mapped the IRQs differently (perhaps COM3 and 4 to other IRQs to allow concurrent access with COM1 and 2) then you must have this package. 
get/set Linux serial port information 
creates a session and sets the process group ID 
run a program in a new session 
set terminal attributes 
sets the effective user ID of the current process. If the effective userid of the caller is root, the real and saved user ID's are also set. 
setuid (SUID)
UNIX programs that can be run by a user, but which have root privileges. Key point: In theory, setuid programs can only be installed by root, and they are considered as part of the operating system, because they inherently bypass security checks and must verify security themselves. A typical example is the passwd command, which a user runs in order to change his/her password. It must be setuid, because it changes files only root has access to, but yet it must be runnable by users. Key point: In practice, setuid programs often have bugs that can be exploited by logged in users. Key point: As part of hardening a system, the administrator should scour the system and remove all unnecessary setuid programs. Linux find / -type f -perm +6000 -exec ls -l {} \; Solaris find / -type f \( -perm -4000 -o -perm -2000 \) -exec ls -l {} \; In order to remove the suid bit, you can use the command chmod -s filename. Removing the suid bit will disable a lot of programs. Two programs that really need to have this bit turned on are /usr/bin/passwd, which users run to change their passwords, and /bin/su, which elevates a normal user to super user (when given the correct password). Key point: Some programs are really setguid which only changes the group context rather than the user context. Key point: Windows doesn't have the concept of setuid. Instead, RPC is used whereby client programs (run by users) contact server programs to carry out the desired task. For example, in order to change the password, the client program asks the SAM to do it on behalf of the user. Thus, whereas UNIX requires a myriad of client programs to verify credentials and be written securely, Windows only requires a few server programs to do the same. Key point: A common way to backdoor a system is to place a SUID program in the /tmp directory. 
Setuptool is a user-friendly text mode menu utility which allows youto access all of the text mode configuration programs included in the Red Hat Linux operating system. 
set the keyboard using the X Keyboard Extension 
Software-Entwicklungs-Umgebung (CASE) 
Source Entry Utility (IBM, ADT) 
Simple editor for X The Simple editor for X (SeX) is a relatively small, simple, not too slow editor for X. It has no text mode user interface. It doesn't have very many features. The primary attraction is the mouse language, which is almost identical to xterm's, but clicking the middle mouse button inside a selection cuts it instead of pasting it. 
Full-featured native X11 communications program. Seyon is a complete full-featured modem communications package for the X Window System. Some of its features are: - dialing directory - terminal emulation (DEC VT02, Tektronix 4014 and ANSI) - script language - Zmodem 
Service Feature (IN) 
Sign Flag (assembler) 
Standard Form 
Switching Fabric 
Shared Frame Buffer Interconnect 
convert between various audio formats 
Simple Formattable Document (CCITT, MHS, X.420) 
Start Frame Delimiter (ethernet) 
Symbolic File Directory 
Partition table manipulator for Linux 
Small Form Factor [committee] (org.) 
Library for computing Fast Fourier Transforms This library computes Fast Fourier Transforms (FFT) in one or more dimensions. It is extremely fast. This package contains the shared library version of the fftw libraries in single precision. To get the static library and the header files you need to install sfftw-dev. 
display information about audio files 
Sfio is a library for managing I/O streams. It provides functionality similar to that of Stdio, the ANSI C Standard I/O library, but via a distinct interface that is more powerful, robust and efficient. 
Enhanced library for managing I/O streams. Sfio is a portable library for managing I/O streams. It provides similar functionality to the ANSI C Standard I/O functions known collectively as Stdio. However, it has a distinct interface and is generally faster and more robust than most Stdio implementations. Sfio also introduces a number of new features and concepts beyond Stdio stream I/O processing. 
Enhanced library for managing I/O streams. Sfio is a portable library for managing I/O streams. It provides similar functionality to the ANSI C Standard I/O functions known collectively as Stdio. However, it has a distinct interface and is generally faster and more robust than most Stdio implementations. Sfio also introduces a number of new features and concepts beyond Stdio stream I/O processing. 
Sorry For My Jumping In (slang, Usenet, IRC) 
SCSI disk format and repair tool Sformat will let you low-level format and repair bad blocks on SCSI disks. It can help you get data off a failing disk and often resurrect an apparently-broken drive. Users of SunOS will recognise the features from Sun's format command. 
System File Protection (MS, WIndows) 
Select a File for Processing and Read Next Spool Buffer (IBM, VM/ESA, CP) 
Secure Fast Packet Switching (Cabletron) 
Structured Full-text Query Language 
MPEG 4 Structured Audio files decoder. Sfront compiles MPEG 4 Structured Audio (MP4-SA) bitstreams into efficient C programs that generate audio when executed. It supports real-time, low-latency audio input/output and MIDI input from soundcards. MP4-SA is a standard for normative algorithmic sound, that combines an audio signal processing language (SAOL) with score languages (SASL, and the legacy MIDI File Format). 
Self-Certifying File System common files SFS is a secure, global file system with completely decentralized control. It takes NFS shares exported from localhost and transports them securely to other hosts; NFS services do not need to be exposed to network. SFS features key management and authorization separated from filesystem with key revocation separated from key distribution. SFS requires solid NFSv3 support; Linux kernel version 2.2.18, 2.4.0 or greater is required (earlier versions need patching). SFS home page is at 
Shared File System (IBM. CMS, VM/ESA) 
Stepless Frequency Selection 
Suomen Standardisoimisliitto [Standards Association of Finland] (org., Finland) 
System Fault Tolerance (Novell) 
System File Table (DOS) 
Screened Foiled Twisted Pair [cable] (UTP, TP) 
Secure file transfer program 
Simple File Transfer Protocol (RFC 913) 
Security Features User's Guide 
Execute command as different group ID 
Signal Ground (MODEM) 
Utilities for working with generic SCSI devices. This package includes a number of utilities to manipulate the linux "sg" (version 2) device driver, and to a lesser extent, the version 1 driver found in the 2.0.x kernels. The version 2 driver is only found in 2.2.x linux kernels; if you are using 2.4, please install the sg3-utils package instead. The package includes: * isosize - gives the number of bytes in an iso9660 filesystem * scsi_inquiry - same as sg_inq, only uses SCSI_IOCTL_SEND_COMMAND * sg_dd - a variant of 'dd' that works with the sg interface * sg_debug - prints debug info for all open sg file descriptors * sg_inq - a utility for poking around with the SCSI INQUIRY command * sg_map - shows the mapping between SCSI devices and sg devices * sg_rbuf - tests SCSI bus speed * sg_readcap - prints the output of a READ CAPACITY command * sg_runt_ex - an example program to test the sg driver version * sg_scan - displays the SCSI bus on stdout * sg_start - spins up (or down) disks * sg_test_rwbuf - tests the SCSI host adapter * sg_turs - execute a TEST UNIT READY command on the given device * sg_whoami - displays information about the given sg device * sginfo - a re-porting of the 'scsiinfo' program to use sg devices * sgp_dd - like sg_dd, only multithreaded It also includes sg_simple1 and sg_simple2, which demonstrate calls to the SCSI INQUIRY and TEST UNIT READY commands. They only differ in their error processing: sg_simple1 uses sg_err.[hc] for error processing while sg_simple2 does its own more primitive checks. 
Shared Global Array (DEC, VMS) 
The Stanford GraphBase: combinatorial data and algorithms. A highly portable collection of programs and data for researchers who study combinatorial algorithms and data structures. The programs are intended to be interesting in themselves as examples of literate programming. Thus, the Stanford GraphBase can also be regarded as a collection of approximately 30 essays for programmers to enjoy reading, whether or not they are doing algorithmic research. The programs are written in CWEB, a combination of TeX and C that is easy to use by anyone who knows those languages and easy to read by anyone familiar with the rudiments of C. This package contains only the libraries and the demonstration programs; for the readable source code, which forms the documentation as well, see the sgb-doc package. 
SCSI Graphic Commands (SAM) 
Silicon Graphics Incorporated (manufacturer, SGI) 
Set Group ID: a file attribute which allows a program to run with specific group privileges no matter who executes it. 
SGID (set group ID)
The SGID permission causes a script to run with its group set to the group of the script, rather than the group of the user who started it. It is normally considered extremely bad practice to run a program in this way as it can pose many security problems. Later versions of the Linux kernel will even prohibit the running of shell scripts that have this attribute set.
SeGmentation Message 
Standard Generalized Markup Language (ISO 8879, JTC1, RFC 1874, SGML) 
The ISO standardization organization has normalized a set of characters symbolic names ("character entities") used by SGML documents of many types. There are character entities for latin languages, math symbols, greek, cyrillic, etc. This package also includes very basic utilities to allow SGML catalogs manipulation. 
common SGML DTDs and entities This package includes Document Type Definitions for HTML Level 0, 1, 2, 3, 3.2, and 4.0, DTDs representing the capabilities for popular browsers, SGML and XML declarations, and popular XML DTDs. Also included are ISO standard entities (SGML and XML), HTML standard entities, and other generally useful sets of entities. Access to these data files is facilitated by the inclusion of an SGML catalog file which defines a default SGML declaration and a default DTD for documents whose DOCTYPE is 'html', and which links system identifiers to public identifiers for other SGML DTDs and entity sets. No setup is required by the user, due to the Debian SGML/XML common layer (see the sgml-base package) 
create HTML output from a LinuxDoc DTD SGML source file 
create GNU info output from a LinuxDoc DTD SGML source file 
create LaTeX, DVI, PostScript or PDF output from a LinuxDoc DTD SGML source file 
create LyX output from a LinuxDoc DTD SGML source file 
create RTF output from a LinuxDoc DTD SGML source file 
create plain text output from a LinuxDoc DTD SGML source file 
Generic formatter for SGML documents using DSSSL stylesheets sgml2x allows to easily format a SGML document using DSSSL stylesheets, and provides the following features: * Multiple possible stylesheets per document class * Easy integration of new stylesheets by adding a simple new definition file in a configuration directory * The caller can specify a PATH-like list of configuration directories, defaulting to a system-wide, a per-user, and a per-project configuration directories * Automatic selection of a default stylesheet to be used 
convert SGML to XML 
Standard Generalized Markup Language - Binary version (SGML), "SGML-B" 
check the syntax of an LinuxDoc DTD sgml source file 
Find differences in the markup of two SGML files 
normalize SGML documents 
handle SGML conditionalization for SGML-tools 
translate output of sgmls using ASP replacement files 
a simple post-processor for nsgmls 
SGMLS-based example Perl script for processing SGML parser output This is an example of a Perl script to post-process SGML parser output using the SGMLS Perl modules. To make sensible use of this package you will need to install a suitable SGML parser as well. 
SGML typesetting system able to create Texinfo documents. Sgmltexi is a DTD with tools to get Texinfo. The idea is to have another way to write Texinfo documents, intended to be a little bit easier. Sgmltexi manages Texinfo nodes automatically, generating an Info menu at the Top node, and other menus if required. 
process sgml files. 
Replaced by sgmltools-lite (dummy package for upgrade) sgmltools-2 is now obsoleted and replaced by sgmltools-lite. This is dummy package for automatic migration. 
convert DocBook SGML source into HTML using DSSSL A text-formatting package based on SGML (Standard Generalized Markup Language), which allows you to produce TeX/DVI/PS/PDF, HTML, RTF, and plain ASCII (currently via w3m by default) from a single source with other recommended and suggested packages; due to the flexible nature of SGML, many other target formats are possible. This tool can not handle DocBook XML yet. For DocBook SGML only. HTML can be generated without any other Debian text processing package, but for the other formats the appropriate packages have to be installed. You need to install lynx or w3m for ASCII text output (w3m is the default txt backend). Also jadetex is required for PS and PDF, and linuxdoc-tools for ld2db conversion. This system is tailored for writing technical software documentation, an example of which are the Linux HOWTO documents. However, there is nothing Linux-specific about this package; it can be used for many other types of documentation on many other systems. It should be useful for all kinds of printed and online documentation. The package was formerly called linuxdoc-sgml because it originates from the Linux Documentation Project (LDP). The name has been changed into sgmltools to make it clearer that there is no Linux-specific stuff included in this package. This is the latest version of the sgmltools series and the successor of sgmltools v2. 
outputs system SGML catalog path 
Simple Gateway Monitoring Protocol (RFC 1028) 
Synchronous Graphics Random Access Memory (DRAM, RAM) 
a tool to search a file for structured pattern Sgrep (structured grep) is a tool for searching text files and filtering text streams for structured criteria. Sgrep implements a query language based on so called region expressions. Like grep, sgrep can be used for any kind of text files. However it is most useful for text files containing some kind of structured text. A file containing structured text could be defined as a file, which obeys some syntax. Examples of structured text files are SGML, HTML, C, Tex and mail files. 
Serving GPRS Support Node (GPRS, mobile-systems) 
Surrounding Gate Transistor (IC) 
Semi-Graphical Tree Structure Interface 
GNU Bourne-Again SHell 
The GNU shell utilities are a set of useful system utilities that are often used in shell scripts. The sh-utils package includes basename (to remove the path prefix from a specified pathname), chroot (to change the root directory), date (to print/set the system time anddate), dirname (to remove the last level or the filename from a givenpath), echo (to print a line of text), env (to display/modify theenvironment), expr (to evaluate expressions), factor (to print primefactors), false (to return an unsuccessful exit status), groups (toprint the groups a specified user is a member of), id (to print the real/effective uid/gid), logname (to print the current login name),nice (to modify a scheduling priority), nohup (to allow a command to continue running after logging out), pathchk (to check a file name's portability), printenv (to print environment variables), printf (to format and print data), pwd (to print the current directory), seq (to print numeric sequences), sleep (to suspend execution for a specified time), stty (to print/change terminal settings), su (to become another user or the superuser), tee (to send output to multiple files), test(to evaluate an expression), true (to return a successful exit status), tty (to print the terminal name), uname (to print system information), users (to print current users' names), who (to print a list of the users who are currently logged in), whoami (to print the effective user id), and yes (to print a string indefinitely). 
Secure Hash Algorithm (cryptography, NIST) 
Super High Aperture [LCD] (LCD) 
SHA-1 (United States Government Secure Hash Algorithm, FIPS 180-1, ANSI 9.30-2, ISO/IEC 10118-3)
SHA-1 is a popular hash algorithm. It converts an input file or message into a "unique" 160-bit fingerprint. This fingerprint is believed to be "unique"; while it is theoretically possible that two inputs could hash to the same fingerprint, it is nearly statistically impossible. Contrast: SHA-1 is currently (year 2001) considered to be the strongest hash function available. It has a larger size (160-bits vs. 128-bits) and has underground thorough scrutiny without discovery of weaknesses (such as MD5). On the other hand, it is one of the slower hash algorithms. History: SHA-1 is a slight variation of SHA. It adds a one-bit shift at one stage in order to overcome a theoretical weakness. SHA was based upon MD4, enhanced to overcome known weaknesses and increase the length to 160-bits. See also: integrity 
The shadow-utils package includes the necessary programs for converting UNIX password files to the shadow password format, plus programs for managing user and group accounts. The pwconv command converts passwords to the shadow password format. The pwunconv command unconverts shadow passwords and generates an npasswd file (a standard UNIX password file). The pwck command checks the integrity of password and shadow files. The lastlog command prints out the last login times for all users. The useradd, userdel and usermod commands are used for managing user accounts. The groupadd, groupdel andgroupmod commands are used for managing group accounts. 
toggle shadow passwords on and off 
shadowed passwords (/etc/shadow)
UNIX was designed around the concept of making the encrypted form of passwords readable by everyone. These passwords were stored in the /etc/passwd file, along with the full account information. It was thought to be secure because the passwords were stored in an encrypted format within this file. However, this is not secure in practice because users tend to choose easily guessable passwords. A program called crack was developed that would guess dictionary words (/usr/dict) and then attempt to brute force the passwords. On an average UNIX system, 90% of all passwords could be cracked with a few days worth of computing time. In order to solve this problem, a "shadow" password file was developed. The encrypted passwords are removed from the normal /etc/passwd and placed in a special file (usually /etc/shadow) that is only readable by root. The remaining account information is left in the original password file for backwards compatibility. Example: The following is a table of typical locations for the shadowed passwords: AIX 3 /etc/security/passwd or /tcb/auth/files// A/UX 3.0s /tcb/files/auth/?/ BSD4.3-Reno /etc/master.passwd ConvexOS 10 /etc/shadpw ConvexOS 11 /etc/shadow DG/UX /etc/tcb/aa/user/ EP/IX /etc/shadow HP-UX /.secure/etc/passwd IRIX 5 /etc/shadow Linux /etc/shadow OSF/1 /etc/passwd[.dir|.pag] SCO Unix #.2.x /tcb/auth/files// SunOS4.1+c2 /etc/security/passwd.adjunct SunOS 5.0 /etc/shadow System V Release 4.0 /etc/shadow System V Release 4.2 /etc/security/* database Ultrix 4 /etc/auth.dir or /etc/auth.pag UNICOS /etc/udb Key point: In the old days, most remote attacks against UNIX were directed at the /etc/passwd file. For example, the most common form of the phf would be to grab the password file. As password shadowing becomes more common, such attacks are increasingly being pointed at the shadow password file instead. 
The Shapecfg program configures and adjusts traffic shaper bandwidth limiters. Traffic shaping is setting parameters or limits on bandwidth consumption, to which network traffic should conform. To use Shapecfg,you must have also installed the kernel which supports the shaper module (kernel versions 2.0.36 or later and late 2.1.x kernels). 
Traffic Shaper for Linux The traffic shaper for Linux configures and adjusts traffic shaper bandwidth limiters. Traffic shaping means setting parameters or limits to which network traffic should conform - that is, setting limitations on bandwidth consumption. See README.shaper for more details. An init script which sets up traffic shaping using class-based queueing is also provided. This can be used to build smart bandwidth shapers which know about TCP/IP. See README.cbq for more details. The kernel support needed to use either of these facilities is described in README.Debian. 
A user-mode traffic shaper for tcp-ip networks. Shaperd is a user-mode program that can shape traffic passing through a Linux box. As it runs as a normal daemon, some kind of packet-forwarding mechanism is needed. This can be done with the BSD divert sockets patch for Linux 2.2, or with netfilter's built-in libipq under Linux 2.4. 
Configuration and Release management using AtFS. ShapeTools is a collection of programs to support software configuration management in an UNIX environment. It consists of a set of version and attribute control commands, and a configuration interpreter and build tool ("shape"). The toolkit is integrated on top of the Attributed File System (AtFS). ShapeTools is designed to live meaningfully together with any other UNIX tool operating on regular files. This distribution also contains a prototype for a comprehensive change control and release management system designed to manage the evolution of system releases in multi programmer software development efforts. 
create shell archives 
/shar'ki:v/ n. [Unix and Usenet; from /bin/sh archive] A flattened representation of a set of one or more files, with the unique property that it can be unflattened (the original files restored) by feeding it through a standard Unix shell; thus, a sharchive can be distributed to anyone running Unix, and no special unpacking software is required. Sharchives are also intriguing in that they are typically created by shell scripts; the script that produces sharchives is thus a script which produces self-unpacking scripts, which may themselves contain scripts. (The downsides of sharchives are that they are an ideal venue for Trojan horse attacks and that, for recipients not running Unix, no simple un-sharchiving program is possible; sharchives can and do make use of arbitrarily-powerful shell features.) Sharchives are also commonly referred to as `shar files' after the name of the most common program for generating them. 
shared library
A library where the linker leaves a note in the output that says "when this is run, it will first have to load this library". Shared libraries tend to make for smaller executables than static library. On Linux they have names like 
shared media
Networks like Ethernet whereby multiple computers connect to the same wire. Key point: In such systems, any computer on the wire can eavesdrop on its neighbors. Contrast: Most corporations are replacing their shared media nets with switched connections. 
shared memory
memory which can be access by more than one process in a multitasking operating system with memory protection 
Shared memory pixmaps
They are 2 dimensional arrays of pixels in a format specified by the X server, where the pixmap data is stored in the shared memory segment. See MIT-SHM. 
shared secret
The idea that many people share the same password or key. Shared secrets are widely use because they are easy: there is simply one password to give out. On the other hand, the more widely secrets are shared, the more likely it will become compromised. In fact, many people believe that even sharing a secret among two people is extremely risky, where the proper solution is using public keys to distribute a randomly generated key only valid for the particular message. Example: DVD movies are encrypted with a randomly generated key. This key is then is then encrypted multiple times with hundreds of different keys. Every DVD player vendor owns one of these keys and imbeds it in their device, thus allows that player to decrypt the movie. (Presumably, if one of the keys is compromised, future movies can be generated without the offending key, causing players based upon that key to become obsolete). However, there is no good way to protect these keys, even though they are in hardware. In late 1999, students in Europe where able to break one of these keys (the Xing software DVD player), and from there they were able to break the majority of the other keys. (These keys only used 40-bit encryption, so breaking one key in the software player allowed a known-plaintext attack). 
ShareTheNet lets you share your low cost Internet connection across your network. Using ShareTheNet, all of the computers on your network can do their own work on the Internet as though they have their own connection. ShareTheNet allows just about any network software to use the Internet and its ultra-secure. Distribution development is not all that active. 
/sheir'weir/ n. A kind of freeware (sense 1) for which the author requests some payment, usually in the accompanying documentation files or in an announcement made by the software itself. Such payment may or may not buy additional support or functionality. See also careware, charityware, crippleware, FRS, guiltware, postcardware, and -ware; compare payware. 
A form of commercial software, where it is offered as "try before you buy". If the customer continues to use the product after a short trial period, they are required to pay a specified, usually nominal, fee. (Also, see Open Source and Public Domain.) 
shar, unshar, uuencode, uudecode `shar' makes so-called shell archives out of many files, preparing them for transmission by electronic mail services. `unshar' helps unpacking shell archives after reception. Other related utility programs help with other tasks. `uuencode' prepares a file for transmission over an electronic channel which ignores or otherwise mangles the eight bit (high order bit) of bytes. `uudecode' does the converse transformation. 
The sharutils package contains the GNU shar utilities, a set of tools for encoding and decoding packages of files (in binary or text format) in a special plain text format called shell archives (shar). This format can be sent through email (which can be problematic for regular binary files). The shar utility supports a wide range of capabilities (compressing, uuencoding, splitting long files for multi-part mailings, providing checksums), which make it very flexible at creating shar files. After the files have been sent, the unshartool scans mail messages looking for shar files. Unshar automatically strips off mail headers and introductory text and then unpacks the sharfiles. Install sharutils if you send binary files through email very often. 
Segmented Hypergraphics EDitor (MS, Windows, ADT) 
A command interpreter that allows a user to run executable code. Shells also store and configure additional information about a user's executable paths, environment variables, and usability options. 
A text-mode window containing a command line interface to the operating system. 
a utility program that enables the user to interact with the UNIX operating system. Commands entered by the user are passed by the shell to the operating system which carries them out. The results are then passed back by the shell and displayed on the user's display. 
One of several command line interfaces available on Unix machines, some common shells include Bourne shell, ksh, and tcsh. 
The default command-line interface on UNIX systems. Key point: This is similar to the "Command Prompt" or incorrectly named "DOS Prompt" on Windows systems. Key point: Many systems pass filenames along with commands directly to the shell. Hackers can exploit this by sending special shell characters (like the pipe | character) as part of filenames in order to execute their own commands. This is an example of an input validation exploit. Examples of this are web-servers, PERL scripts, and CGI scripts. Key point: The most popular shell among hackers is probably "bash", the shell from GNU that ships with Linux. (Culture: The original shell on UNIX is known as the "Bourne Shell", named for its creator. The acronym "bash" means "Bourne Again SHell", reflecting that fact that it is a rewrite of that shell). Key point: Retrieving someone's .bash_history file is a common attack against UNIX machines. Several embedded systems have shipped such that the file could be retrieved via the web. Key point: The holy grail of UNIX hacking is to somehow obtain (or re-obtain) a root shell. In other words, the hacker wants to get a command-line on the victim system in order to carry out any task. For this reason, buffer overflow exploits often contain what is called "shell code". When the victim process is running with root privileges, the buffer-overflow will cause that process to begin running a shell. For example, an exploit might send a long password containing the shell code to an FTP server, converting the TCP connection to the FTP server into a full command-prompt from which any program can be launched. 
[orig. Multics n. techspeak, widely propagated via Unix] 1. [techspeak] The command interpreter used to pass commands to an operating system; so called because it is the part of the operating system that interfaces with the outside world. 2. More generally, any interface program that mediates access to a special resource or server for convenience, efficiency, or security reasons; for this meaning, the usage is usually `a shell around' whatever. This sort of program is also called a `wrapper'. 3. A skeleton program, created by hand or by another program (like, say, a parser generator), which provides the necessary incantations to set up some task and the control flow to drive it (the term driver is sometimes used synonymously). The user is meant to fill in whatever code is needed to get real work done. This usage is common in the AI and Microsoft Windows worlds, and confuses Unix hackers. Historical note: Apparently, the original Multics shell (sense 1) was so called because it was a shell (sense 3); it ran user programs not by starting up separate processes, but by dynamically linking the programs into its own code, calling them as subroutines, and then dynamically de-linking them on return. The VMS command interpreter still does something very like this. 
shell out
vi. [Unix] To spawn an interactive subshell from within a program (e.g., a mailer or editor). "Bang foo runs foo in a subshell, while bang alone shells out." 
shell prompt
a character at the start of the command line which indicates that the shell is ready to receive your commands. The character is usually a '%' (percent sign) or a $ (dollar sign). It may be different on your system. 
shell prompt
An application that offers interactive console or terminal access to a computer system. 
Shell Prompt
The user input area of a shell. Whereas in a DOS shell the command prompt is designated by a Greater Than (>) symbol, in Linux it is usually a Percent (%) symbol, Dollar sign ($) or other special character, depending on the shell used. (Also, see Command Prompt.) 
shell script
A program written to be interpreted by the shell of an operating system such as Linux. 
Shell Script
A script designed to be run automatically when a shell is started. 
Shell Scripting
Shell Scripting and hence computer programming is merely the idea of getting a number of commands to be executed, that in combination do some unique powerful function. 
When a hackers successfully exploit vulnerabilities like buffer overflows, they will typically open a shell at the end of the exploit. With a command-line shell, the hacker will then be able to carry out any task they desire. However, opening shells within buffer overflow exploits can be difficult. Therefore, hackers often maintain libraries of "shellcode": code fragments for various operating systems that can be pasted into buffer overflow exploits. Key point: One of the difficulties in writing shellcode is that need to pass through filters. For example, when exploiting a bug in an SMTP server, you may find that the server strips the high-order bit from all bytes (i.e. will pass text but not binary). Therefore, all bytes between 0x00-07F will pass through, but not 0x80-0xFF. Alternately, a big limitation is systems that won't pass nul characters (0x00) because they terminate strings in functions like strcpy(). Therefore, when a hacker picks shellcode to append to their script, they must be fully aware of the limitations of the system they are dealing with. Key point: When creating new shellcode, create a C program that calls something like "system("/bin/sh");" or "execve("/bin/sh",0,0);" and grab the assembly output. At that point, pare it down to what you need. This requires extensive knowledge of assembly, needless to say. Key point: Sometimes you won't be able to grab a shell, so you have to create the exploit script to run a command. Typical choices of commands would be those that change passwords, add accounts, or in some fashion open up some other hole on the system. Key point: The vast majority of buffer overflow attacks will execute /bin/sh. Therefore, by simply removing this program (or replacing it with something that double-checks what's being done), you can protect yourself against many 0-day exploits. 
The GNU shell programming utilities. The utilities: basename chroot date dirname echo env expr factor false groups hostid id logname nice nohup pathchk pinky printenv printf pwd seq sleep stty tee test true tty uname users who whoami yes. 
Super-High Frequency 
library for displaying messages - runtime This is Sverre H. Huseby's library for displaying messages in terminal based programs. It can treat the verbosity level and prepend the program name if necessary. This package contains what you need to run programs that use this library. 
Command line option parser - runtime This is Sverre H. Huseby's library for parsing command line options. Both traditional one-character options and GNU-style --long-options are supported. This library does a little more than standard getopt. This package contains what you need to run programs that use this library. upstream webpage: 
shift left (or right) logical
[from any of various machines' instruction sets] 1. vi. To move oneself to the left (right). To move out of the way. 2. imper. "Get out of that (my) seat! You can shift to that empty one to the left (right)." Often used without the `logical', or as `left shift' instead of `shift left'. Sometimes heard as LSH /lish/, from the PDP-10 instruction set. See Programmer's Cheer. 
The SHell Object Oriented Programming library Every language under the sun these days is Object Oriented. In an effort to make POSIX shell more buzzword compliant, and to show that it's really not a big deal for a language to lack built-in OO support, we have added object orientation to plain old shell script. Specifically, we have implemented classless OO with introspection, finalization, serialization, and multiple inheritance. 
A collection of shoop modules This package includes various modules for shoop, such as introspect, prettyprint, serialize, and some others. It is a good idea to have these at hand! 
Shoreline Firewall (Shorewall) The Shoreline Firewall (Shorewall) is an iptables based firewall that can be used on a dedicated firewall system, a multi-function masquerade gateway/server or on a standalone Linux system. Shorewall supports these features: * Customizable using configuration files. * Supports status monitoring with an audible alarm when an "interesting" packet is detected. * Include a fallback script that backs out the installation of the most recent version of Shoreline Firewall and an uninstall script for completely uninstalling the firewall. * Static NAT is supported. * Proxy ARP is supported. * Provides DMZ functionality. * Support for IPSEC, GRE and IPIP Tunnels. * Limited support for Traffic Control/Shaping 
An object that simplifies the process of accessing a file or running a program. A desktop icon is an example of an application shortcut. 
shoulder surfing
Slang for watching somebody type their password on their keyboard. In much the same way that hackers teach themselves to read upside-down (in order to read documents when seated in front of a desk), hackers can also practice watching people type on the keyboard. Analogy: Crooks often steal credit card numbers in the same way. They stand behind people in line and read their credit cards as they sit on the countertop during handling. 
displays all characters in the current screen-font. 
displays all characters in the current screen-font. 
font dumper for X font server 
A feature-rich image viewer ShowImg is a feature-rich image viewer which can display numerous formats, including JPEG, PNG, GIF (animated) and MNG. It consists of a tree view frame, a directory/preview frame, and a view frame. The (larger) view frame can be exchanged with the (smaller) directory/preview frame. It can preview and display images from multiple directories and search for identical images. ShowImg also features a full-screen mode, zooming, sorting, drag'n'drop with Konqueror, and support for images in compressed archives (.zip). 
examine the scan codes and keycodes sent by the keyboard 
A tool for scanning a UNIX NFS servers to see what directories it is sharing/exporting and to whom. There are two basic forms of this command: showmount victim Shows which machines are logged onto the victim NFS server. showmount -e victim Shows which directories are being exported, and which groups can log on. Entries marked as (everyone) allow anybody to log on. Key point: This command used the rpc.mountd protocol (RPC program number 100005). On most systems, these commands do not require authentication, which means that anybody can run them. The showmount command with no arguments equates the MOUNTPROG_DUMP procedure, whereas the -e option equates to the MOUNTPROG_EXPORT procedure. This protocol is extremely light-weight, only two packets in each direction are needed: one for the portmap, and one for the procedure call. Contrast: Similar capabilities exist on Windows for Microsoft's SMB protocols. The net view \\victim command on Windows will view the shares that the victim is exporting. 
show mount information for an NFS server 
uncompile an rgb color-name database 
delete a file securely, first overwriting it to hide its contents 
GNU Portable shell tool GNU shtool is a tool for developers of software programs. It is a compilation of small but very stable and portable shell scripts into a single shell tool. All ingredients were in successful use over many years in various free software projects. The compiled shtool program is intended to be used inside the source tree of other free software packages. There it can overtake various (usually non-portable) tasks related to the building and installation of such a package. It especially can replace the old, and related scripts. 
Somebody Had To Say It (slang, Usenet) 
Secure HyperText Transfer Protocol (HTTP), "S-HTTP" 
Secure hypertext transfer protocol - developed by Enterprise Integration Technologies to ensure security with commercial transactions on the Internet. 
SHTTP (Secure Hyper Text Transport Protocol)
A secure, encrypted version of HTTP used for financial transactions and other private information sent via the Internet. 
SHTTP (Secure Hypertext Transport Protocol)
An extension of the World Wide Web's HyperText Transport Protocol (HTTP) that supports secure commercial transactions on the Web. Secure HTTP provides this support in two ways by assuring vendors that the customers attempting to buy the vendors' wares are who they say they are (authentication) and by encrypting sensitive information, such as credit-card numbers , so that it cannot be intercepted while en route. Secure HTTP was developed by Enterprise Integration Technology (EIT) and the National Center Supercomputing Applications (NCSA), with subsequent commercial development by Terisa system. Netscape communications developed a competing security technology , the Secure Sockets Layer (SSL) protocol. The two security protocols are incompatible, and for a time it was feared that no single widely accepted security protocol would emerge. In early 1995, however Netscape invested heavily in Terisa Systems and announced that it would integrate Secure HTTTP and SSL to provide the Web community with a single security protocol that will work with any security-capable browser. 
bring the system down 
brings the system down in a secure way. All logged in users are notified that the system is going down, and login(1) is blocked. It is possible to shut the system down immideately, or after a delay. All processes are first notified that the system is going down by the signal SIGTERM. This gives programs like vi(1) the time to save the file being editted, mail and news processing programs a chance to exit cleanly, etc. Shutdown does its job by signalling the init process, asking it to change the runlevel. Runlevel 0 is used to halt the system, runlevel 6 is used to reboot the system and runlevel 1 is used to put to system into a state where administrative tasks can be performed. 
shut down part of a full-duplex connection 
Standard High Volume [motherboard] (SMP, Intel) 
a console hotline client Used to connect to Hotline servers. See for more information about Hotline. 
/proc system information viewer si (System Information Viewer) is a Linux application that displays information about the local computer from data gathered from the /proc filesystem, a readable interface to kernel memory. si displays information related to the CPU, hardware, memory, kernel, filesystems, network and running processes. Information is presented in a plain-text dump, colorized-pages, or process-information interface. 
Schweizer Informatikergesellschaft (org., Switzerland) 
Sk?rslutaeknifelags Islands (org., Iceland) 
Source Index [register] (CPU, Intel, assembler) 
SPARC International (org., manufacturer) 
System Information 
Semiconductor Industry Association (org., USA) 
Common files for all versions of the Siag spreadsheet. These are the scheme library files for siag, and examples sheets. 
Common files for Siag Office Siag Office is a bundle of the following programs: * siag [Scheme In A Grid], a spreadsheet * pw [Pathetic Writer], a word-processor * egon, an animation program * xfiler, a file manager 
Plugins for Siag Office These are the standard plugins for use with Siag Office. 
Society for Industrial and Applied Mathematics (org., USA) 
Service Independent building Block (IN) 
SIxteen Bit Organizer or SIngle Board Organizer (Psion, PDA) 
Silicon Integrated Circuit 
Standard Industry Classification 
Subject Indicator Code 
??? (org.) 
Swedish Institute of Computer Sciences (org., Sweden) 
Security IDentifier 
Signaling IDentifier 
Society for Information Displays (org.) 
SWIFT Interface Device (SWIFT) 
System IDentification 
System Independent Data Format (Novell, SMS) 
Serial Impact Dot Matrix [printer] 
Music player for tunes from C64 and C128 (console) This is a simple music player for C64 and C128 tunes, also known as SID tunes. The package includes a program (sid2wav) for creating .wav files. 
Service Independent Data Requester (Novell, Netware) 
Http regression testing and benchmarking utility Siege is an regression test and benchmark utility. It can stress test a single URL with a user defined number of simulated users, or it can read many URLs into memory and stress them simultaneously. The program reports the total number of hits recorded, bytes transferred, response time, concurrency, and return status. Siege supports HTTP/1.0 and 1.1 protocols, the GET and POST directives, cookies, transaction logging, and basic authentication. Its features are configurable on a per user basis. 
Http/https regression testing and benchmarking utility Siege is an regression test and benchmark utility. It can stress test a single URL with a user defined number of simulated users, or it can read many URLs into memory and stress them simultaneously. The program reports the total number of hits recorded, bytes transferred, response time, concurrency, and return status. Siege supports HTTP/1.0 and 1.1 protocols, the GET and POST directives, cookies, transaction logging, and basic authentication. Its features are configurable on a per user basis. This version of siege package includes HTTPS support. 
Siemens TTCN Test Manager (TTCN, Tektronix, SNI) 
Significant Pel Field (MPEG) 
Software Implemeted Fault Tolerance (HIFT) 
Sender-Initiated File Transfer/Unsolicited File Transfer (RFC 1440), "SIFT/UFT" 
/sig/ n. (also common as a prefix in combining forms) A Special Interest Group, in one of several technical areas, sponsored by the Association for Computing Machinery; well-known ones include SIGPLAN (the Special Interest Group on Programming Languages), SIGARCH (the Special Interest Group for Computer Architecture) and SIGGRAPH (the Special Interest Group for Computer Graphics). Hackers, not surprisingly, like to overextend this naming convention to less formal associations like SIGBEER (at ACM conferences) and SIGFOOD (at University of Illinois). 
Special Interest Group 
sig block
/sig blok/ n. [Unix; often written `.sig' there] Short for `signature', used specifically to refer to the electronic signature block that most Unix mail- and news-posting software will automagically append to outgoing mail and news. The composition of one's sig can be quite an art form, including an ASCII logo or one's choice of witty sayings (see sig quote, fool file); but many consider large sigs a waste of bandwidth, and it has been observed that the size of one's sig block is usually inversely proportional to one's longevity and level of prestige on the net. See also doubled sig. 
[ACM] Special Interest Group on ARTificial intelligence (org., ACM, AI) 
Special Interest Group on Business Information Technology 
Special Interest Group for CD-ROM Applications Technology (CD) 
Special Interest Group on Computer Personal Research (org., ACM) 
Special Interest Group on Computer Science Education (org., ACM) 
Special Interest Group on Design Automation (org., ???) 
SIGnaturGesetz DFUe, Germany, "SigG" 
SIGnal Line (REXX) 
Software Industrialized Generator and Maintenance Aids system (MITI) 
Software interrupts sent to a program to indicate that an important event has occurred. The events can vary from user requests to illegal memory access errors. Some signals, like the interrupt signal, indicate that a user has asked the program to do something that is not in the usual flow of control.
used to inform processes of unexpected external events such as a time out or forced termination of a process. A signal consists of prescribed message with a default action embedded in it. Each signal has a unique number associated with it. An example is SEGV, segmentation violation. 
In anti-virus and intrusion detection systems, a signature is a pattern that the system will look for when scanning files or network traffic. (Note: this term is unrelated to digital signatures). Key point: Marketing forces often mean that companies have to fill their products with useless signatures. Don't be impressed because one product has more signatures than another. Key point: One of the key goals of hacking is to evade signature detection. Virus writers attempt to encrypt their viruses, whereas remote hackers attempt to alter the networking protocol so that it has the same effect, but a different pattern on the wire. 
Special Internet Group Name Cache 
Automatic, semi-random ".signature" rotator/generator Signify is a neat little program that allows a random signature to be generated from a set of rules. Each "section" can be one of an unlimited number of possibilities, each with its own weighting so those really cool quotes can appear more often than others. Sections can also be placed next to each other vertically to create columns. Each section can be formatted independently as left/right/center and top/bottom/vcenter. 
Scripts and docs useful for keysigning parties To improve the web of trust, so-called signing parties are held at various occasions 
Special Interest Group for Programming LANguages 
Signature file rotation program. Rotates your .signature file every time the sigrot is run. Includes an option for a non-rotating header and/or footer with a rotating middle. 
SIGnaturVerordnung (DFUe), "SigV" 
Special Interest Group on the world wide WEB (org., UK) 
Static Invocation Interface 
Software and Information Industry Association (org., USA) 
A poker game silly Poker is an advanced poker game with support for a single player against 1-4 computer opponents in five card draw, five card stud, and seven card stud poker games. The program in this package contains support for the standard text interface and the curses interface. 
Secure Interoperable LAN/MAN Standard (LAN, MAN) 
Standard for Interoperable LAN Security (LAN) 
Signal Interface Module 
Subscriber Identity Module (GSM, mobile-systems) 
Single Instruction [stream], Multiple Data [stream] (CPU) 
SIMulation DISposition (MBAG) 
Simulator Construction Gear -- shared libraries SimGear is a collection of libraries useful for constructing simulation and visualization applications such as FlightGear or TerraGear. This package contains the shared libraries. 
SIcheres MIkroprozessor System (SNI) 
Single Inline Memory Module (IC) 
SIMulation NETwork (network) 
Simple example from the OpenH323 project The OpenH323 project aims to create a full featured, interoperable, Open Source implementation of the ITU H.323 teleconferencing protocol that can be used freely by everybody. This protocol is most used for Voice over IP (VoIP) conferencing. For more information on the OpenH323 project visit them at 
simple mail transfer protocol (SMTP)
A protocol for delivering email; the standard email protocol used on the Internet, SMTP is also used in other TCP/IP networks. 
Simply GNUstep
Simply GNUstep is a Linux/GNU distribution aimed at providing an OpenStep feeling from bootup on. This is a stripped down distribution, providing ease of use. (Think OS X for x86). InterimDeveloperRelease-1 came out on August 14, 2002. Version 1 was released September 9, 2002. 
Microchip PIC device simulator This software allows to simulate the execution of any program on a Microchip family microcontroller device. 
A tail(1) work-alike that saves and uses state information. since is a tail(1) work-alike that remembers how much of a file you have viewed and displays only what's new when you next view that file. Ideal for viewing log files (it'll only show what's new in the file since the last time it was run). 
GTK+ video/audio player, an alternative frontend to xine Sinek is a GTK+ video/audio player, capable of supporting all formats xine supports. At the moment, this includes: * Audio MPEG layers 1, 2, and 3, * Vorbis (.ogg), * pcm, * Video MPEG 1 and 2, * MPEG 4 (aka OpenDivX), * MS MPEG 4 (aka DivX), * motion jpeg. One of the main differences between Sinek and other popular multimedia players is that it doesn't use skins; instead, it has a standard GTK+ interface. In other words, it doesn't clash with your GTK+ theme. :) 
A fully programmable ping replacement. Sing is a little tool that sends ICMP packets fully customized from command line. The main purpose is to replace/complement the niceful ping command with certain enhancements as: - Send fragmented packets (Linux and BSD). - Send monster packets > 65534 (Linux and BSD). - Send/read spoofed packets.(Libpcap included in distribution). - Send many ICMP Information types in addition to the ECHO REQUEST type sent by default as Address Mask Request, Timestamp, Information Request, - Router Solicitation and Router Advertisement. - Send many ICMP error types: Redirect, Source Quench, Time Exceeded, Destination Unreach and Parameter Problem. - Send to host with Loose or Strict Source Routing. - Use little fingerprinting techniques to discover Window$ or Solaris boxes. - Send ICMP packets emulating certain OS: Cisco, Solaris, Linux, Shiva, Unix and Window$ at the moment. 
single user mode
a system mode created for administrative and maintenance activities demand complete control of the system. When the system is in this state whoever is logged in becomes root. This is however, a minimal system startup state. Only the root partition is mounted so only commands that reside in the root filesystem are available. 
To tap a mouse button one time. 
Simultan Input Output (QMS) 
Python/C++ Bindings Generator SIP is a tool for generating bindings for C++ classes with some ideas borrowed from SWIG, but capable of tighter bindings, because it's specific to C++ and Python. SIP was originally designed to generate Python bindings for KDE and so has explicit support for the signal slot mechanism used by the Qt/KDE class libraries. Features: - connecting Qt signals to Python functions and class methods - connecting Python signals to Qt slots - overloading virtual member functions with Python class methods - protected member functions - abstract classes - enumerated types - global class instances - static member functions. 
SCSI-3 Interlocked Protocol (SAM) 
Session Initiation Protocol (IETF, VOIP) 
Simulated Input Processor 
SMDS Interface Protocol (SMDS) 
Strategische InformationsPlanung (IM) 
Symbolic Input Program 
Simply Interactive Personal Computer 
Serial In Parallel Out 
create and render 3-d scenes This is SIPP, the SImple Polygon Processor, version 3.1. SIPP is a library for creating 3-dimensional scenes and rendering them using a scan-line z-buffer algorithm. A scene is built up of objects which can be transformed with rotation, translation and scaling. The objects form hierarchies where each object can have arbitrarily many subobjects and subsurfaces. A surface is a number of connected polygons which are rendered with either Phong, Gouraud or flat shading. An image can also be rendered as a line drawing of the polygon edges without any shading at all. The library supports texture mapping with textures in up to 3-dimensions and automatic interpolation of texture coordinates. Simple anti-aliasing can be performed through oversampling. A scene can be illuminated by an arbitrary number of light sources and a number of different light sources are availaible. The light from some of them are capable of casting shadows of objects. A basic shading algorithm is provided with the library, but the user can also use his own shading algorithms for each surface to produce special effects. Objects can have varying degree of transparency, controlled by the shader. 
Simple Internet Protocol Plus (IP, IPV6, RFC 1710, Internet) 
SImple Polygone Processor (Unix) 
Single Inline Package Pin (IC) 
Secret IP Router NETwork (DISN, mil.) 
Single Input Queue (IBM, OS/2) 
Save Instruction Recognition 
Selective Information Retrieval 
Serial InfraRed (HP) 
Sicherheit im Rechenzentrum (TPS) 
Statistical Information Retrieval 
Sustained Information Rate (SMDS) 
The full-featured Perl IRC client sirc, the Perl IRC client, is a full-featured package to let you chat with anyone, anywhere in the world. sirc has all the features you need in an IRC client -- DCC, logging, and a huge ability to be customized are all part of the package. With Perl, it's quite simple to extend sirc's capabilities -- the programming interface is well-documented and well-developed. Several example scripts are included in /usr/lib/sirc. 
Supplementary Information REquest at the National Entry (SIS, Europe) 
Schengen Information System (police, Europe) 
Silicon Integrated Systems [corp.] (manufacturer, Taiwan) 
Software Information Services 
Stellen-Informations-Service (WWW) 
Strategic Information System 
Streams and Iteration in a Single-Assignment Language 
Single Instruction [stream], Single Data [stream] (CPU) 
institut fuer SIchere Telekommunikation (GMD, org.) 
Still In The Dark (slang) 
A program for managing a WWW site via FTP, DAV or HTTP sitecopy is for copying locally stored websites to remote ftp servers. With a single command, the program will synchronize a set of local files to a remote server by performing uploads and remote deletes as required. The aim is to remove the hassle of uploading and deleting individual files using an FTP client. sitecopy will also optionally try to spot files you move locally, and move them remotely. sitecopy is designed to not care about what is actually on the remote server - it simply keeps a record of what it THINKS is in on the remote server, and works from that. 
retrieves stories from websites for your Palm Pilot Sitescooper automatically retrieves the stories from several news websites, trims off extraneous HTML, and converts them into formats you can read on your Palm computing device for later reading on-the-move. It maintains a cache, and will avoid stories you've already read. It can handle 1-page sites, 1-page with diffing, 2-level and 3-level sites, and it's very easy to add a new site to its list. Even if you don't have a Palm handheld, it's still handy for simple website-to-text conversion. 
retrieves stories from websites for your Palm Pilot Sitescooper automatically retrieves the stories from several news websites, trims off extraneous HTML, and converts them into formats you can read on your Palm computing device for later reading on-the-move. It maintains a cache, and will avoid stories you've already read. It can handle 1-page sites, 1-page with diffing, 2-level and 3-level sites, and it's very easy to add a new site to its list. Even if you don't have a Palm handheld, it's still handy for simple website-to-text conversion. This package contains sample sites files. 
Simple Internet White Pages Service (Internet) 
Sparkassen-Informatik-Zentrum (org., banking) 
list section sizes and total size. 
Shortest Job First 
A program to use the "Jog Dial" on Sony Vaio Laptops S-Jog is a program that uses the Sony Vaio laptops Jog Wheel to do various things: * Launch applications * Adjust screen brightness * Adjust volume * Act like a mousewheel S-Jog pops up when you click the Jog Wheel then disappears after 3 seconds of idle time. The mousewheel feature is turned on when S-Jog is hidden. 
Interactive vector drawing program for X11 Sketch is an interactive vector drawing program, comparable to CorelDraw. It currently support drawing primitives like rectangles, ellipses, Bezier curves, bitmap and EPS images and text. All objects can be rotated, scaled and sheared. Primitives can have fill and line properties. A number of special effects like blend groups, text to Bezier and text along a path are provided. Sketch supports an unlimited undo history. Import of XFig, AI, WMF, CMX and SVG files. Exports to EPS, AI and SVG. Sketch is written in Python with an Tkinter GUI. User scripts can be written in Python. 
Secure Key Issuing Authority (TESS) 
report process status 
Simple Key-management for Internet Protocols (Internet, cryptography, Sun) 
Simple Kana to Kanji conversion program SKK is a very fast and efficient Japanese input system written entirely in emacs lisp. 
SKK Dictionary (SKK-JISYO.L) This package contains SKK-JISYO.L. SKK-JISYO.[SM] and other dictionaries are provided in skkdic-extra. 
skk Japanese input method front end skk Japanese input method front end. It's usable on console. (not XIM) 
X input method for Japanese for SKK method. skkinput is application to input Japanese for X application using protocols such as kinput2/XIM/Ximp protocol. skkinput communicates with skkserv using Berkeley Socket. Without skkserv, local dictionary files is used. 
A SKK dictionary server handling multiple dictionaries. Skksearch is an alternative to skkserv. Unlike skkserv, it can deal with more than one dictionary. In addition, it supports three types of dictionaries, that is, plain, Berkeley DB 2.x, and cdb format. 
SKK Dictionary server Skkserv is a dictionary server for SKK. 
SKK dictionary maintenance tools This package provides tools to maintain SKK dictionaries. 
Skolelinux is a Norwegian distribution for educational use, as a server with thin clients. 
Many useful functions for the web like smssend This library contains functions about chained lists, string manipulation, socket and HTTP protocol. It's used in gsmssend and smssend. This package contains the files needed for running such applications. 
Correct you if you type `sl' by mistake Sl is a program that can display animations aimed to correct you if you type 'sl' by mistake. 
simple latex to HTML converter 
Service Level Agreement 
Slackware Linux
The Slackware project is volunteer based and well established, with a loyal following. Supports x86 only. Slackware 9.0 was released March 19, 2003. 
Slackware Live CD
Slackware Live CD is a bootable CD containing a Linux operating system. It runs Linux directly from CDROM without installing. The live CD described here is based on Slackware Linux distribution and is downloadable as an ISO. There are also all the scripts and source code needed to build your own live CD. Version was released June 1, 2003. A CD-based distribution. 
Simulation Language for Alternative Modeling 
S-lang is a C-like programming language, designed to be embedded in programs. It provides standard screen handling functions and can provide access to program internals, allowing program users to create customized procedures. 
The S-Lang programming library - runtime version. S-Lang is a C programmer's library that includes routines for the rapid development of sophisticated, user friendly, multi-platform applications. This package contains only the shared library* and copyright information. It is only necessary for programs that use this library (such as jed and slrn). If you plan on doing development with S-Lang, you will need the companion -dev package as well. 
The S-Lang programming library with Japanese patch, runtime version. S-Lang is a C programmer's library that includes routines for the rapid development of sophisticated, user friendly, multi-platform applications. This package contains only the shared library* and copyright information. It is only necessary for programs that use this library (such as jed and slrn). If you plan on doing development with S-Lang, you will need the companion -dev package as well. 
The S-Lang programming library, shared library subset kit. This is used to develop subsets of the S-Lang shared libraries for use on custom installation floppies and in embedded systems. Unless you're making one of those, you won't need this package. 
The S-Lang programming library, shared library subset with utf8 support. This is used to develop subsets of the S-Lang shared libraries for use on custom installation floppies and in embedded systems. Unless you're making one of those, you won't need this package. This packages has wide character support. 
The S-Lang programming library with utf8 support S-Lang is a C programmer's library that includes routines for the rapid development of sophisticated, user friendly, multi-platform applications. This package contains only the shared library* and copyright information. It is only necessary for programs that use this library (such as jed and slrn). If you plan on doing development with S-Lang, you will need the companion -dev package as well. This packages has wide character support. 
OpenLDAP server (slapd). This is the OpenLDAP (Lightweight Directory Access Protocol) standalone server (slapd). The server can be used to provide a standalone directory service and also includes the slurpd replication server and centipede. 
The / character Linux uses in path names. A / by itself, or at the beginning of a pathname, means the root directory of the file system. Slashes are used also between one directory name and the next, and between the directory name and the filename in long path names. 
Slash (/)
The symbol used in file pathnames, instead of the backslash (\) used in the DOS/Windows and OS/2 operating systems. 
A variant of Nethack Super Lotsa Added Stuff Hack - Extended Magic (SLASH'EM) is a role-playing game where you control a single character. The interface and gameplay are similar in style to Rogue, ADOM, Angband and, of course, Nethack. You control the actions through the keyboard and view the world from an overhead perspective. The problem: The Amulet of Yendor has been stolen. Not only that but it appears that the Wizard of Yendor (not a nice person), who took the amulet, is hiding in the Dungeons of Doom (not a friendly place). Enhancements over Nethack includes: - New roles - New skill system - Riding pets - New special levels 
numerical computation library slatec is a fortran library of over 1400 routines for numerical tasks. Some of the subjects covered are: Arithmetic, error analysis, Elementary and special functions, Linear Algebra, Interpolation, Solution of nonlinear equations, Optimization, Differentiation, integration, Differential and integral equations, Integral transforms, Statistics, probability, and Data handling. 
attach a network interface to a serial line 
In hard drive technology, a non-bootable drive that is used mostly for system and file storage; is controlled by the master drive. 
kills all of the user's processes Slay provides you with a way to quickly get rid of all processes selected user owns. Very useful if you want to harm somebody. 
Service Level Contract 
Simple Line Code [modulation] 
Second Level DOMAIN (Internet, ICANN) 
Synchronous Data Link Control 
SyncLink Dynamic Random Access Memory (DRAM, RAM) 
Screen List Editing 
Single Large Expensive Drive 
delay for a specified amount of time 
Pertaining to a UNIX process, to suspend execution until some event takes place or for a specific period of time. Processes automatically sleep while waiting for results from peripherals. 
Sleep for the specified number of seconds 
puts a laptop to sleep during inactivity This is a daemon to force laptops to enter apm sleep after some period of inactivity. This is useful if your laptop does not automatically go to sleep when you aren't using it, and, like me, you often forget to shut it off. The daemon can also be configured to put a laptop to sleep if its battery nearly runs out of power. 
Shared Frame Buffer Interconnect (ATI, Intel) 
Scan Line Interleave (3D) 
SLI mode
SLI means "Scanline Interleave"In this mode, two Pixelfx are connected and render in alternate turns, one handling odd, the other handling even scanlines of the actual output. 
Portable Scheme library. SLIB is a portable scheme library meant to provide compatibility and utility functions for all standard scheme implementations. SLIB includes initialization files for Chez, ELK 2.1, GAMBIT, MacScheme, MITScheme, scheme->C, Scheme48, T3.1, and VSCM. SCM also supports SLIB. 
Serial Link and Interrupt Controller (TSMP, Wyse) 
Subscriber Line Interface Circuit (PBX) 
Extract out pre-defined slices of an ASCII file The slice program reads an input file and divide its prepared ASCII contents into possibly overlapping slices. These slices are determined by enclosing blocks which are defined by begin and end delimiters which have to be already in the file. The final output gets calculated by a slice term consisting of slice names, set theory operators and optional round brackets. For more information, please visit 
Acronym for Serial Line Internet Protocol, SLIP is a serial packet protocol used to connect a remote computer to the Internet using modems or direct serial lines, SLIP requires an Internet provider with special SLIP accounts or a shell account a SLIP emulator such as TIA(tm) or SLiRP. 
see serial line internet protocol (SLIP). 
Serial Line Internet Protocol (Internet, RFC 1055), "SL/IP" 
Serial Line Internet Protocol - A communication method that allows a personal computer to connect directly to the Internet using a standard telephone line. It preceded PPP as the means through which access to the Internet could be achieved. 
SLIP (Serial Line Internet Protocol)
A standard for using a regular telephone line (a serial line) and a modem to connect a computer as a realInternet site. SLIP has largely been replaced by PPP. 
SLIP (Serial Line Internet Protocol)
Allows a computer to connect to the Internet using a modem and telephone line--similar to PPP. Users then navigate the Internet using software on their own computer. This is in contrast to using a dialup teminal connection, where a user is forced to navigate the Net using a text-based set of menus. From Glossary of Distance Education and Internet Terminology
SLIP (Serial Line Internet Protocol)
Predecessor of PPP. Allows a user to connect to the Internet directly over a high-speed modem. From Glossary of Distance Education and Internet Terminology
SLIP (Serial Linux Internet Protocol)
One of two standards specifying how a workstation or personal computers can link to the Internet by means of a dialup connection (the other standard is the Point-to-Point Protocol [PPP] . SLIP defines the transport of data packets through an asynchronous telephone line. Therefore, SLIP enables computers not directly connected to local area networks (LANs) to be fully connected to the Internet. This mode of connectivity is far superior to shell access (a dialup, text-only account on a UNIX computer) because it enables you to use the Internet tools of your choice (such as a graphical Web browser to run more than one Internet application at a time and to download data directly to your computer, with no intermediate storage required. 
SLIP/PPP emulator using a dial up shell account Slirp is a TCP/IP emulator which turns an ordinary shell account into a (C)SLIP/PPP account. This allows shell users to use all the funky Internet applications like Netscape, Mosaic, CUSeeMe, etc. Please note that maybe your ISP really doesn't like you using slirp, because they want to charge more for a ppp connection, so use it at your own risk. 
A simple S-Lang based system performance monitor SLmon is a tool for monitoring system's performance. It displays results using a nice and readable text-based UI, providing either figures or a graph. It currently monitors: - CPU load (SMP is supported) - memory and swap load - uptime, date and time - number of logged in users 
Silly Little Mail Reader 
a secure locate replacement This locate should show only the files on your system that you have access to. Note: If your computer is not up 24/7 you should consider installing anacron since the database is only updated once a night. 
Slocate is a security-enhanced version of locate. Just like locate, slocate searches through a central database (which is updated nightly) for files that match a given pattern. Slocate allows you to quickly find files anywhere on your system. 
Programs for counting physical source lines of code (SLOC) SLOCCount (pronounced "sloc-count") is a suite of programs for counting physical source lines of code (SLOC) in potentially large software systems (thus, SLOCCount is a "software metrics tool" or "software measurement tool"). SLOCCount can count physical SLOC for a wide number of languages; listed alphabetically, they are: Ada, Assembly, awk, Bourne shell, C, C++, C shell, Expect, Fortran, Java, lex/flex, LISP (including Scheme), Modula3, Objective-C, Pascal, Perl, PHP, Python, sed, TCL, and Yacc. SLOCCount can automatically determine if a file is a source code file or not, and if so, which language it's written in. As a result, you can analyze large systems completely automatically. SLOCCount also includes some report-generating tools to collect the data generated and present it in several different formats. 
OpenSSH SSH client (remote login program) 
Service Location Protocol (IP) 
Service Logic Program (IN) 
Symposium on Logic Programming (conference) 
OpenSLP Server (slpd) SLPv2 (RFC 2608) is a IETF standard protocol that is used to discover/advertise services on the network. You can use SLP for anything from locating a suitable printer on your floor to discovering what LDAP directories are available in your organization. This package provides slpd, the OpenSLP daemon, which provides an SLPv2 compliant Service Agent and Directory Agent. 
Personal Information Manager for the console slpim is a Personal Information Manager. It can keep an addressbook with pre-defined fields. slpim can export the addressbook database to many formats, like mutt-alias file, html file, pine format, plain-text, etc. 
Super Letter Quality [fonts] (Star) 
Scalable Linear Recording (Streamer, Tandberg) 
threaded news reader (fast for slow links) Slrn is a threaded news reader with color support that is designed to read news fast over slow links. Slrn can read news via NNTP or directly from a local news spool. Slrn can be heavily customized from its rc file, and even includes a built in macro language. There is also support for killfiles and article scoring. 
threaded news reader (fast for slow links), Japanese version Slrn is a threaded news reader with color support that is designed to read news fast over slow links. Slrn can read news via NNTP or directly from a local news spool. Slrn also has GroupLens support. Slrn can be heavily customized from its rc file, and even includes a built in macro language. There is also support for killfiles and article scoring. 
Shows X-Faces from slrn in an X11 terminal emulator The slrnface helper utility can be used from the slrn news reader to show X-Faces in Usenet articles when slrn is run from an X11 terminal emulator. It is not intended to be run directly from the command line. 
pulls a small newsfeed from an NNTP server Slrnpull pulls a small newsfeed from an NNTP server, to a local news spool directory. The news spool can be used by news readers (such as slrn), which can read a local news spool without a NNTP server. Slrnpull also has the ability to killfile articles so that they will not be downloaded from the server. 
Softlanding Linux System (Linux) 
Storage Library System 
S-Language port of the classic SC spreadsheet The slsc spreadsheet is a much modified version of the public domain spreadsheet sc, posted several years ago by Mark Weiser as vc and originally by James Gosling. slsc is based on Robert Bond's sc 6.1 whereas the latest version of sc is 6.21. 
Super Large Scale Integration 
Solid-Logic Technology 
Secondary Logical Unit 
Serial Line Unit 
Smart Media [card] 
Sparse Mode (PIM, Multicast) 
Shared Memory Architecture 
Standardization Management Activity 
System Management Application Entity (OSI) 
Service Management Agent Function (IN) 
Electronic mail transport system. Smail is a mail transport agent (MTA). An MTA is the innards of the mail system - it takes messages from user-friendly mailer programs and arranges for them to be delivered locally or passed on to other systems as required. 
small computer systems interface (SCSI)
A high-speed interface that can connect to computer devices such as hard drives, CD-ROM drives, and tape drives. SCSI is pronounced as "Scuzzy." 
Small Linux
A Small Kernel Project; Small Linux has been used (console based) on a 386 laptop with 2 meg of ram and a 40 meg hard drive. Small Linux 0.8.1 is the current version, released December 6, 2001. 
Stripped down version of Cooledit. Only a few of cooledit's commandline options are supported by smalledit. 
The GNU Eiffel Compiler SmallEiffel is a compiler for the Eiffel language, which is a pure object-oriented language providing strong type-checking and based on the concept of 'design by contract'. It allows multiple inheritance and does it well. Design-by-contract means that a class guarantees that certain conditions will always hold, and that a routine guarantees certain results given certain specified inputs. The rules for inheritance mean that contracts can be relied on even when classes are reused through inheritance. The Eiffel language is described and defined in the book "Eiffel: The Language" by Bertrand Meyer. 
A high-level declarative programming language and programming environment that treates computations as objects that send messages to one another. SmallTalk encourages the programmer to define objects in terms relevant to the intended application. The language is highly extensible because it enables you to create objects, which can be reused, quite easily. SmallTalk inspired HyperTalk, the software command language of HyperTalk, an application provided with every Macintosh produced since 1987. In this new guise, SmallTalk fulfills its goal of making programming more accessible; tens of thousand of Macintosh users have learned how to program in HyperTalk. See object-orientated-programming language. 
System Management Application Process (OSI) 
Self-Monitoring, Analysis and Reporting Technology (HDD, IDE, Conner, IBM, Quantum, Seagate, WD), "S.M.A.R.T." 
smart card
A smart-card looks like a credit-card but contains an embedded microprocessor. The gold contact pad with roughly 8 contact points is visible on the outside of the card. As of the year 2000, typical circuits consisted of an 8-bit microprocessor running at 5MHz, 1K of RAM, and 16K of ROM with a 9.6-kbps half-duplex interface. (Much of the design of AES focused on being able to run within these stringent requirements). Key point: Whereas the data on the magnetic strip of a credit-card can be easily read or changed, smart-cards are designed to be tamper proof. Example: All Germans have a smart-card for health insurance. As of 2001, smart-cards have been popular in Europe for about a decade, but are still mostly unknown in the United States. Example: The tamper-proof features make it popular for authentication in both physical security and infosec uses. 
smart terminal
n. 1. A terminal that has enough computing capability to render graphics or to offload some kind of front-end processing from the computer it talks to. The development of workstations and personal computers has made this term and the product it describes semi-obsolescent, but one may still hear variants of the phrase `act like a smart terminal' used to describe the behavior of workstations or PCs with respect to programs that execute almost entirely out of a remote server's storage, using local devices as displays. 2. obs. Any terminal with an addressable cursor; the opposite of a glass tty. Today, a terminal with merely an addressable cursor, but with none of the more-powerful features mentioned in sense 1, is called a dumb terminal. There is a classic quote from Rob Pike (inventor of the blit terminal): "A smart terminal is not a smartass terminal, but rather a terminal you can educate." This illustrates a common design problem: The attempt to make peripherals (or anything else) intelligent sometimes results in finicky, rigid `special features' that become just so much dead weight if you try to use the device in any way the designer didn't anticipate. Flexibility and programmability, on the other hand, are really smart. Compare hook. 
A smartcard utility for Linux `smartcard' allows you to control a smart card reader from the command line. Currently, it supports just a few basic commands which only work on plain I2C memory cards. 
Versatile and Intelligent List Processor SmartList is a mailing list manager built on top of the procmail mail processing package. Some features: * Enough intelligence to overcome the ignorance of some subscribers (will direct subscribe and unsubscribe requests away from the regular list and automatically onto the -request address). * No hardwired format for (un)subscribe requests (i.e. new subscribers need not be educated, unsubscribing users do not need to remember any particular syntax). *Intelligent* automatic removal of addresses from the list that cause too many bounces. * Duplicate submissions are eliminated automatically. * You can set up a mailing list to function as a standalone mail archive server. 
SMART suite - SMART utility suite for Linux SMART suite controls and monitors storage devices running the Self-Monitoring, Analysis and Reporting Technology System (S.M.A.R.T.) build into ATA and SCSI Hard Drives. This is used to check the reliability of the hard drive and predict drive failures. The suite contains two utilities: smartctl is a command line utility designed to perform simple smart tasks; smartd is a daemon that periodically monitors smart status and reports errors to syslog. 
System Management Application Service Element (OSI) 
Introduction This is the SMB HOWTO. This document describes how to use the Server Message Block (SMB) protocol, also called the Session Message Block, NetBIOS or LanManager protocol, with Linux using Samba. Although this document is Linux-centric, Samba runs on most Unix-like operating systems. This document is maintained by David Wood ( Additions, modifications or corrections may be mailed there for inclusion in the next release. Much more Samba documentation is available at the Samba Web site, located at There is a tremendous amount of information there; please have a look before asking for help! You also might try the comp.protocols.smb newsgroup. The SMB protocol is used by Microsoft Windows 3.11, NT and 95/98 to share disks and printers. Using the Samba suite of tools by Andrew Tridgell (, UNIX (including Linux) machines can share disk and printers with Windows hosts. The smbfs tools by Paal-Kr. Engstad ( and Volker Lendecke ( enable Unix machines to mount SMB shares from Windows or Samba hosts. There are four basic things that one can do with Samba: Share a Linux drive with Windows machines. Access an SMB share with Linux machines. Share a Linux printer with Windows machines. Share a Windows printer with Linux machines. All of these are covered in this document, plus a few other odds and ends. Disclaimer: The procedures and scripts either work for the author or have been reported to work by the people that provided them. Different configurations may not work with the information given here. If you encounter such a situation, please e-mail the author with suggestions for improvement in this document. Please note that for Windows 3.x machines to access SMB shares, they must have a TCP/IP stack and the Win32s DLLs. Both of these are available on Microsoft's Web site ( As of the writing of this version of the HOWTO, Microsoft are reportedly requiring a subscription to the Microsoft Software Developers Network (MSDN) to download the TCP/IP-32 stack for Windows 3.x from their Web site. Since this software used to be free, many older copies are in existance and may be acquired from friends and user group contacts. From SMB-HOWTO
Server Message Block [protocol] (IBM, Intel, MS) 
Small Medium Business and enterprise [market] 
SMB is the protocol used by Microsoft for file and print sharing. SMB stands for Server Message Block, though that doesn't really mean anything. SMB runs on top of NetBIOS, though in Win2k it can bypass NetBIOS. History: SMB was originally developed for DOS machines. It was later upgraded so that OS/2 machines could act as servers for DOS machines. The protocol was later upgraded for Windows (Wfw = Windows for Workgroups) and Windows NT. Still later upgrades have been added for Windows 2000. This constant evolution and need for backwards compatibility has led to many security holes within the protocol. The most severe is the need for "LAN Manager" authentication. Key point: SMB is an application layer protocol and can run over many different transports, including TCP/IP. A common problem is that home-users enable SMB over TCP/IP, allowing anybody on the Internet to access their hard-disk. They should instead install a local-only transport such as NetBEUI for SMB, which will allow file access among local machines, but not remote machines across the Internet. Key point: SMB-sniffers can read the encrypted password info off the wire and send them to password crackers. 
Standards Managing Board (PIMA, I3C) 
System Management Bus 
A Windows Network client that is accessible through a web browser. With this package you will be able to browse a Windows Network using a standard web browser. It is based upon the samba package. 
Shared Memory Buffer Architecture (Intel) 
Set or get ACLs on an NT file or directory names 
A LanManager like simple client for Unix. The Samba software suite is a collection of programs that implements the SMB protocol for unix systems, allowing you to serve files and printers to Windows, NT, OS/2 and DOS clients. This protocol is sometimes also referred to as the LanManager or NetBIOS protocol. This package contains some client components of the Samba suite. In particular it includes the command line utilities smbclient, smbtar, and smbspool. If you want to mount shares exported from Microsoft Windows machines or a Samba server you must install the smbfs package. 
ftp-like client to access SMB/CIFS resources on servers 
send messages to smbd or nmbd processes 
server to provide SMB/CIFS services to clients 
mount and umount commands for the smbfs (for kernels >= than 2.2.x) Smbfs is a filesystem which understands the SMB protocol. This is the protocol Windows for Workgroups, Windows NT or LAN Manager use to talk to each other. It was inspired by samba, the program by Andrew Tridgell that turns any unix site into a file server for DOS or Windows clients. If you want to use command-line utilities like smbclient, smbtar and/or smbspool just need to install the smbclient package. Starting with the Debian Samba packages version 2.2.0-1, the old smbfs utilities for 2.0.x have been removed. There are no wrapper scripts that call a specific smbmount/smbumount depending on the kernel version. If you are using a 2.0.x kernel please upgrade or use the latest Samba 2.0.7 Debian package. 
helper utility for mounting SMB filesystems 
mount an smbfs filesystem 
Sever Message Block Protocol 
change a user's SMB password 
The Samba encrypted password file 
send print file to an SMB printer 
report on current Samba connections 
shell script for backing up SMB/CIFS shares directly to UNIX tape drives 
smbfs umount for normal users 
SCSI-3 Medium changer Commands (SAM, SCSI) 
Standard Microsystems Corporation (manufacturer) 
Storage Module Device 
Surface Mounted Device 
System Management Bus (Intel) 
Single MAC Dual Attached Concentrator (FDDI, DAC, MAC) 
Storage Module Disk Interconnect 
Standard Music Description Language (ISO, IEC, CD 10743) 
Station Message Detail Recording 
Storage Management Data Requester (Novell, Netware, SMS) 
Switched Multimegabit Data Service (BELLCORE) 
SMDS (Switched Multimegabit Data Service)
A standard for very high-speed data transfer. 
SMDS Customer Network Management (SMDS), "SMDS CNM" 
Society of Manufacturing Engineering (org., USA) 
Storage Management Engine (Novell, Netware, SMS) 
SME Server
Once known as e-smith, this server and gateway distribution is now owned by Mitel Networks, and called SME Server. Mitel released version 5.5 of the SME Server on July 3, 2002. The SME Server version 5.6 developer release came out January 15, 2003. SME Server 6.0 Beta 2 developer release came out June 20, 2003. 
Service Management Function (IN) 
Single Mode Fiberoptic cable (FDDI) 
Standard MIDI File (MIDI) 
Special / System Management Functional Area (OSI) 
Script Mathematical Formula Formatter 
Special Mobile Group (GSM, org., mobile-systems) 
Structure and identification of Management Information (OSI, RFC 1155/1902) 
Sun Microsystems Inc. (manufacturer) 
System Management Interrupt (SMB) 
System Monitoring Interface (Informix, DB) 
Synchronized Multimedia Integration Language (W3C, WWW) 
Secure/Multipurpose Internet Mail Extensions (MIME, MS, Lotus, Qualcomm, RSA, cryptography), "S/MIME" 
Service-Marketing-InformationsSystem (MBAG) 
System Management Interface Tool (IBM, AIX) 
Software Migration Kit 
Structured Meta-Knowledge 
Service Management Layer (TMN) 
Shared Memory Link (TCP/IP) 
Siemens Modular Link 
Standard Machine Language 
Standard Meta Language 
A major Emacs mode for editing Standard ML. It provides syntax highlighting and automatic indentation and comes with sml-proc which allows interaction with an inferior SML interactive loop. 
Standard Meta Language / New Jersey, "SML/NJ" 
System Management Mode (CPU) 
System Manager's Manual (BSD, Unix) 
A latency logging and graphing system. SmokePing is a latency logging and graphing system. It consists of a daemon process which organizes the latency measurements and a CGI which presents the graphs. With SmokePing you can measure latency and packet loss in your network. SmokePing uses RRDtool to maintain a longterm datastore and to draw pretty graphs giving up to the minute information on the state of each network connection. 
SmoothWall was first released to the world in July 2000 as a hardened internet firewall device. Products include Smoothwall Server and Smoothwall GPL. Smoothwall GPL 2.0 beta1 (metro) was released August 28, 2002. Smoothwall GPL 1.0 was released December 10, 2002. Smoothwall 2.0 beta 4 was released January 24, 2003. A 'secured' distribution. 
see symmetric multi-processing (SMP). 
Software Motion Picture (DEC) 
Symmetric MultiProcessor [system] (SMP) 
Symmetrisches MultiProzessor [system] 
System Modification Program 
SMP (Symmetric Multi-Processing)

Shared Memory Parallel Computer (HPC) 
script to get information about the installed version of SMPEG 
SMPEG GTK+ MPEG audio/video player SMPEG (SDL MPEG Player Library) is a free MPEG1 video player library with sound support. Video playback is based on the ubiquitous Berkeley MPEG player, mpeg_play v2.2. Audio is played through a slightly modified mpegsound library, part of splay v0.8.2. SMPEG supports MPEG audio (MP3), MPEG-1 video, and MPEG system streams. This package contains a GTK+ player called gtv. 
SMPEG command line MPEG audio/video player SMPEG (SDL MPEG Player Library) is a free MPEG1 video player library with sound support. Video playback is based on the ubiquitous Berkeley MPEG player, mpeg_play v2.2. Audio is played through a slightly modified mpegsound library, part of splay v0.8.2. SMPEG supports MPEG audio (MP3), MPEG-1 video, and MPEG system streams. This package contains a command line player called plaympeg. 
SDL MPEG Player Library - XMMS plugin SMPEG (SDL MPEG Player Library) is a free MPEG1 video player library with sound support. This package contains an XMMS plugin for playing MPEG movies. It supports hardware acceleration, seeking in movies, fullscreen mode, a resizeable window and VideoCD support. 
Session Manager Proxy 
Society of Motion Picture and Television Engineers (org.) 
Switch Module Processor Unit 
Source Maintainability and Reliability 
Specialized Mobile Radio [systems] 
SendMail Restricted SHell: the shell that Sendmail uses to execute programs. smrsh puts restrictions on the programs that can be run to make it safer than using a regular shell such as the Bourne Shell. 
Signal Message Rate Timing 
Service Management System 
Short Message Service (GSM, mobile-systems) 
Storage Management Services (Novell, Netware) 
System Management Server (MS) 
System-Managed Storage 
Send SMs via Polish GSM operators This program allows you to send SMs (Short Messages - incorrectly being called SMSes) to mobile phones operated by three Polish GSM operators: Era, Plus and Idea. It sends the messages via web-to-SMS gateways by spoofing a web browser. 
Society of Management Science and Applied Cybernetics (org., India) 
Short Message Service Center (SMS, GSM, mobile-systems) 
Short Message Service Cell Broadcast (SMS), "SMS CB" 
Short Message Service Center External Machine Interface [protocol] (SMS) 
A program for sending short messages (SM / SMS) smsclient is a tool for sending short messages (SM - often false named SMS). SM can be sent to mobile phones. Additional some paging systems are supported by this tool. smsclient supports the common protocols UCP, TAP and some other. Out of the box there is preconfigured support for many local services, but smsclient can be easily extended to support other systems. 
Storage Management Services Protocol (Novell, SMS) 
Utility to send SMS messages to GSM mobile phones smssend is a small command line utility to send SMS messages to GSM mobile phones via a web to SMS gateway. Web to SMS gateways are scriptable. this package includes scripts for many common sms web gateways. 
SMS Server Tools for GSM modems The SMS Server Tools make your server into a central SMS gateway. You can send and receive SM using a simple file-based interface. This Software was made for users who send less than 20 000 messages each month. There is an event-handler option that allows you to call your own programs or scripts after sent or received SM. The SMS Server Tools use one or more (max. 32) GSM modems to send and receive SM. You can equip some modems with Vodafone SIM cards and other with Telmi SIM cards (for example), to save money. All SM are sorted in queues by provider. If one modem fails it will be deactivated for one hour before the software retries. The other modems run without any restriction. You can log status information and alarms using the syslog daemon of your operating system. Upstream URL: 
Segment Table Map 
Shared Memory Transport (X-Windows) 
Station ManagemenT (FDDI) 
Surface-Mount Technology 
Subordinate Message Transfer Agent (MTA) 
Show Me The Money is a configurable Perl/Tk stock ticker program smtm, which is a not overly clever acronym for Show Me The Money, is a simple stock ticker application. It creates and automatically updates a window with stock quotes from Yahoo! Finance. When called with one or several stock symbols, it displays these selected stocks, and also records the symbols for later use. When smtm is called without arguments, it reads the symbols tickers from a (default or specified) file. This file can be created explicitly by calling the Save option from the File menu, or implicitly whenever smtm is called with one or more symbols. smtm is fully configurable -- it can display the stock symbol and the full name of the company, the price change, the percentage change, the volume traded, the profit or loss, the value of the holding, the length of the holding period as well as annualised percentage returns. The display can be sort on almost any of the columns. Losers are flagged in red. smtm can be used for North American equities, as well as European and Australian/NZ ones. It should work for other markets supported by Yahoo! Finance. The quotes are delayed, typically 15 minutes for NASDAQ and 20 minutes otherwise, see Yahoo! Finance for details. 
An acronym for Simple Mail Transport Protocol, which defines the mechanism for exchanging mail across a network. This protocol is described in RFC number 821. 
see simple mail transfer protocol (SMTP). 
Simple Mail Transfer Protocol (RFC 821, TCP/IP) 
SMTP (Simple Mail Transfer Protocol)
Key point: Virtually all e-mail exchanged on the Internet is through SMTP. Key point: The most common exploits for SMTP involve spammers trying to relay mail through high-speed mail servers. 
SMTP (Simple Mail Transfer Protocol)
SMTP is the Internet standard for the transferring of electronic mail messages. An SMTP server acts as a central 'post office' for addressing mail to all users within wide area and local area networks. 
SMTP (Simple Mail Transfer Protocol)
The main protocol used to send electronic mail from server to server on the Internet. SMTP is defined in RFC 821 and modified by many later RFC's. 
Simple spam-block with refusal message Smtp-refuser can be configured to reject mail from specific hosts (or that satisfy other tcpd hosts.allow or similar rules), returning a meaningful message including the reason it was bounced and a local phone number. Because spam often has a bad envelope-from, (and because this is more efficient), we bounce it with an error message during the SMTP transaction, rather than send bounce mail later. This SMTP refuser is used along with "tcpd" or (another TCP security daemon) to bounce messages from the IP addresses of known spammers. The advantage of this over just blocking the connection is that the remote SMTP server will not retry, and a legitimate e-mail sender will get a polite message telling them why their mail was blocked and whom to call to get around the blocking. Mail that is not blocked by smtp-refuser is delivered to your standard mail transport agent. Other, more automated solutions such as RBL and ORBS (supported by most of the mail transfer agents), have become available since smtp-refuser was written, but this may still be of interest to you. 
Mail proxy for firewalls with anti-spam and anti-relay features Smtpd uses two programs, smtpd which listens for incoming mail and places it in a private queue, and smtpfwdd, which invokes sendmail to deliver messages from the queue. The configuration file for smtpd has powerful features for controlling the acceptance of incoming mail. It is particularly useful for firewall sites, where the policy aspects of which mail should be accepted (in smtpd's configuration file) are clearly separated from the routing and other aspects of the mail configuration (which remain in the sendmail configuration file) It can be used with any mail-transport-agent which can be invoked as sendmail but is intended to integrate with the Debian sendmail package, which recognises when smtpd has been installed. If you are attempting to use it with an MTA other than sendmail then you will need to be prepared to modify the MTA configuration. 
SMTP feed -- SMTP Fast Exploding External Deliver for Sendmail Smtpfeed is a SMTP delivery agent which is called by sendmail, and it improves required time to complete delivery of copies of a message to recipients of huge number. Note that smtpfeed still in ALPHA testing release. 
Seldom Met Users Group [book] (HP, HP 3000) 
A SoundFont editor for Linux / *nix Smurf is a sound font editor. Sound font files are a collection of audio samples and other data that describe instruments for wavetable sound cards. Smurf currently supports the AWE 32/64 and has limited support for the GUS/SoftOSS driver which can use any OSS supported 16 bit sound card. 
An exploit that sends a ping to a broadcast address using a spoofed source address. Everyone on the target segment responds to the source address, thereby flooding it with traffic. 
SNMP MUltipleXing protocol (SNMP, MUX, RFC 1227) 
Sequence Number 
Serial Number 
Small NNTP server for leaf sites sn is a small news system for small sites serving perhaps a few dozen newsgroups, and with a slow connection to the internet. It is similar to leafnode (, by Arnt Gulbrandsen). The target user is a home or SOHO with a single modem connection to the Internet, maybe running IP masq or similar, and serving a few workstations. 
Subscriber Number (MS-ISDN, GSM, mobile-systems) 
Systems Network Architecture (IBM) 
A relatively complete algebraic calculator for GNOME. SNAC is a calculator for X using the GNOME libraries. It provides a decent set of functions, similar to what you would find on a low-end scientific calculator. While not very complex it's quite useful and is the best simple calculator I've found for X using the GNOME libraries. 
SNA Network Access Controller (SNA, SDLC, IDS) 
SubNetwork ACcess [functions] 
ASN.1 to C or C++ or IDL compiler Snacc is short for "Sample Neufeld ASN.1 to C Compiler" and ASN.1 stands for Abstract Syntax Notation One (ITU-T X.208/ISO 8824). Snacc supports a subset of ASN.1 1988. If you need features of ASN.1 1992 or later, snacc is not for you. Given an ASN.1 source file(s) snacc can produce: 1. C routines for BER encoding, decoding, printing and freeing. 2. C++ routines for BER encoding, decoding, and printing. 3. A type table that can be used with C driver routines for BER encoding, decoding, printing and freeing. If you want to build snacc based applications, you want to install the libsnacc-dev package, too. Your application will then depend on the snacc libraries, you find in the libsnacc0 package. 
SubNetwork ACcess Procedure (ISO, IS 8648, SNAC), "SNAcP" 
[PPP] Systems Network Architecture Control Protocol (PPP, SNA, RFC 2043) 
Systems Network Architecture Distribution Service (IBM, CCS) 
Situation Normal All Fouled Up (slang) 
[advanced] Systems Network Architecture/Internet Protocol (SNA, IP, RFC 1538), "SNA/IP" 
Snake game This is a basic but nice implementation of the snake game. The objective is to "snake around" and eat fruit, while avoiding the evil headbanger and not crashing into your tail. Features five levels of difficulty and a site-wide high score list. 
A Perl-based console Napster client Snap is a small, Perl-based, command-line Napster client written with the Perl Curses bindings. It is designed to be small yet fully functional, while providing a powerful scripting environment through the use of Perl. Snap supports full song searching/browsing with regular expression filtering, multiple simultaneous uploads and downloads with upload speed throttling, resume support, chatting, hotlists, all Napster admin commands including Opennap extensions, alternate server and metaserver support, and much more. 
SubNetwork Access Protocol (LAN, ethernet) 
SubNetwork Attachment Point (IEEE 802.1a) 
System and Network Administration Program 
SnapGear Embedded Linux
SnapGear Embedded Linux is a 100% free distribution supporting several processors (with an emphasis, perhaps, on MMU-less processors - the principal developers of uClinux are at SnapGear). SnapGear adds development expertise, toolchain, library and multi-architecture support to create a complete embedded development environment. The initial release is dated April 16, 2003. 
A program for creating and studying hyperbolic 3-manifolds. SnapPea is Jeff Weeks' computational tool for mathematicians working in low-dimensional topology. It is used for creating and studying hyperbolic 3-manifolds, and is accessible via Python scripts as well as through a traditional graphical user interface. 
A command-line URL grabber Snarf is a utility retrieve files via the http and ftp protocols. It supports http redirect, http and ftp resume, http and ftp authentication, and other neat things. Its functionality is similar to that of wget, but with a much smaller binary. 
Single Node Control Point (IBM, SNA) 
Sound file editor Snd is a powerful sound file editor that can be customized and extended using the Scheme programming language. 
SubNetwork Dependent Convergence [functions] (OSI) 
Easy soundcard configuration Sndconfig is a utility that lets you configure your soundcard easily. It was written originally for RedHat Linux, but now it is available for Debian GNU/Linux, too. Sndconfig uses isapnp to detect common soundcards and writes a isapnp configuration to and module control lines for use with your sound card. It requires a kernel with OSS sound modules to be present. 
SubNetwork Dependent Convergence Procedure (ISO, IS 8648, OSI, SNDC) 
Semantic NEtwork Processing System (GNU, LISP), "SNePS" 
Server Natural Format (Fonts, X) 
Shared Network Facilities 
Satellite News Gathering 
Siemens Nixdorf Informationssysteme [AG] (manufacturer) 
SNA Network Interconnection (IBM, VTAM, SNA) 
Subscriber Network Interface (SMDS) 
Storage Networking Industry Association (org., NAS, SAN) 
SubNetwork Independent Convergence [functions] (OSI) 
report process status 
SubNetwork Independent Convergence Procedure (ISO, IS 8648, OSI, SNIC) 
v.,n. 1. To watch IP packets traversing a local network. Most often in the phrase `packet sniffer', a program for doing same. 2.Synonym for poll. 
sniffer (sniffing, packet sniffer)
A wiretap that eavesdrops on computer networks. Key point: You have be between the sender and the receiver in order to sniff traffic. This is easy in corporations using shared media, but practically impossible with an ISP unless you break into their building or be an employee. Key point: Sniffers are frequently used as part of automated programs to sift information off the wire, such as clear-text passwords, and sometimes password hashes (to be crack). Further reading: 
packet sniffer and monitoring tool sniffit is a packet sniffer for TCP/UDP/ICMP packets. sniffit is able to give you very detailed technical info on these packets (SEC, ACK, TTL, Window, ...) but also packet contents in different formats (hex or plain text, etc. ). 
Sandia National Laboratories (org., USA) 
NET SNMP (Simple Network Management Protocol) Apps. The NET SNMP applications allow querying the NET and other SNMP agents. 
Simple Network Management Protocol (RFC 1157/1902, TCP/IP, IETF) 
Simple Network Management Protocol. An Internet protocol. Allows nodes to determine which services another nodes offer. 
SNMP (Simple Network Management Protocol)
A method for keeping track of various hardware devices, such as printers, connected to a network. SNMP can tell network administrators when printers are low on paper or toner, or when a paper jam has occurred. SNMP seems destined to be replaced by die Microsoft at Work standard or the Desktop Management Interface (DMI) standard. 
SNMP (Simple Network Management Protocol)
A set of standards for communication with devices connected to a TCP/IP network. Examples of these devices include routers, hubs, and switches.
SNMP (Simple Network Management Protocol)
The Internet infrastructure is composed of lots of hardware scattered around the place. SNMP is the method that allows someone to "manage" all that equipment. By the word "manage" I mean do things like monitor the amount of traffic flowing through the equipment, trigger when faults occur, change the configuration of equipment remotely, and so forth. Key point: Most equipment comes with default passwords (aka. community strings) of public and private. These allow you to read information from the device (traffic, temperature, voltage, etc.) and re-configure it. Key point: A common technique is to traceroute to a victim's dial-up machine thereby discovering the IP address of the hardware they've dialed into. Then, you can send SNMP commands with the "private" community strings telling the hardware to hang-up on the victim. Also, spammers have used this technique to find the true login name of the user. 
SNMP is defined in RFC 1089. From Matisse

NET SNMP (Simple Network Management Protocol) Agents. The NET SNMP agent allows remote monitoring of various network and system information. 
A configurable snmp trap handler daemon for snmpd. This package contains a configurable snmp trap handler daemon for snmpd. The output of this trap handler daemon may be specified via a configuration file and written to a logfile or to the syslog daemon. During installation of this package, the configuration file for the snmptrapd daemon is changed (old version is saved) to activate the trap handler. The snmpd and snmptrapd daemons are restarted. 
Stuttgart Neural Network Simulator (IPVR, NN) 
StriNg Orientated symBOlic Language 
Captures communication between two external serial devices Snooper passes data transparently between two serial (RS232C) devices, capturing and logging the data and occasional comments you want to insert into the logs. It is useful for debugging or analyzing the communications protocol between two devices that would normally be connected directly to each other, e.g. a digital camera and a personal computer. By sitting "in the middle" (after you connect the two devices to serial ports on your Linux machine) snooper is able to capture data traveling in either direction while also passing it unmodified to the other device. It is also possible to operate with a single serial device, using your console and keyboard as the second device. 
An execve() wrapper and logger snoopy is merely a shared library that is used as a wrapper to the execve() function provided by libc as to log every call to syslog (authpriv). system administrators may find snoopy useful in tasks such as light/heavy system monitoring, tracking other administrator's actions as well as getting a good 'feel' of what's going on in the system (for example apache running cgi scripts). 
Flexible NIDS (Network Intrusion Detection System) Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of other attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting capability, with alerts being sent to syslog, a separate "alert" file, or even to a Windows computer via Samba. 
An interactive snowflake generator. In addition to generating pretty snowflake patterns, the code for this program, as originally conceived by Raph Levien was an exercise in cryptography. The bit pattern from an ordinary ASCII string or a hexadecimal key can be used to generate a unique snowflake. 
SubNetwork Protocol 
Sub-Network Point of Attachment 
Simple Network Paging Protocol (RFC 1861, SMS) 
Serial NumbeR (IMEI, GSM, mobile-systems) 
Signal-to-Noise Ratio 
Set Normal Response Mode (SDLC, HDLC, ADDCP, LAPB) 
Set Normal Response Mode Extension (SNRME) 
Secure Network Server 
A curses-based utility that polls hosts to determine connectivity. Simple network top (sntop) is a curses-based console utility, in the spirit of top, that polls network hosts at a regular interval to determine their connectivity and displays the results in a pretty format. Advanced features, such as automatic HTML generation of results, secure terminal mode, execution of external file on connectivity change, and user/system configure files, are supported. 
Simple Network Time Protocol (RFC 2030) 
Start Of Authority record (DNS) 
State Of the Art (slang) 
SOA (Start of Authority)
In DNS, the SOA record is the "root" record for a domain (or "zone"). Hack: If you control the SOA for a reverse mapping, you can spoof the reverse lookup for an IP address. Let's say that you controlled the DNS server for, you can choose to return any domain name you want. This can be used to subvert a number of systems that rely upon reverse lookups, such as older /etc/hosts.equiv files (specifically, the older istrusted() function call). 
Simple Object Access Protocol (W3C, XML, HTML) 
Symbolic Optimizer and Assembly Program 
Start Of Block 
Systems and Option Catalog 
social engineering (con, human engineering)
Social engineering is a form of hacking that targets people's minds rather than their computers. A typical example is sending out snail mail marketing materials with the words "You may already have won" emblazoned across the outside of the letter. As you can see, social engineering is not unique to hackers; it's main practitioners are the marketing departments of corporations. Key point: The classic example is to pretend to be from a company's computer department and call up a user asking for their password. Sophisticated hacks will first try to make the victim uncomfortable (i.e. "We've detected improper use of your account..."), then offer them the opportunity to be very helpful ("I'm sure we can check this out now and not involve your boss."). The technique often works well in reverse: call up the computer support department and tell them you've lost your password. This works especially well in companies that have policies requiring you to change your password -- people forgetting passwords on really old accounts are frequent, so support departments are deluged with such requests, so it's easy to slip one past them. Key point: Know as much about your victim as possible. If you are emulating something, try to find the answers to typical questions you will be asked. Key point: If all else fails, try stupidity. If you are a foreigner, pretend not to speak the language well. Likewise, females have certain advantages in male-dominated cultures. Example: For members-only access, please create an account: Username: Password: Confirm: People often choose the same password for everything. For example, put in your website the prompt shown to the right. A lot of users will use the same username/password for this that they use for websites like Hotmail, Yahoo mail, or Netscape mail. This will therefore sift valid e-mail accounts from people who visit your site. In a similar manner, these passwords might be useful within the companies they work for as well. Key point: Newbies are favorite victims of social-engineering attacks in chat rooms. Hackers go after people who appear to be unsure of themselves online. Key point: Many hackers do not consider social-engineering a "real" attack because it doesn't require extensive technical knowledge in order to pull off. 
An Internet address that combines an IP address (the four-part numerical addrss that uniquely identifies a prticular computer on the Internet) and a port number (which identifies a prticular Internet application, such as File Transfer Protocol [FTP], Gopher, or the World Wide Web [WWW]). See well-known port. 
Multi purpose socket tool The socket program is a simple tool for socket based connections. It can be used to create simple daemons (in both standalone and inetd mode), to connect to other daemons or to redirect ports. 
sockets / WinSock
In programming, the "sockets" interface is the most common way that coders use to access the network. Sockets works by creating a "file handle" that when written to, sends data over the network rather than to a file on the hard-disk. Contrast: Other interfaces programmers could use are higher-level abstractions like RPC, or lower-level "raw" interfaces like libnet. Contrast: Sockets originally came from UNIX, but has been ported to other platforms. In particular, the "WinSock" variant for Windows includes both the UNIX-style functions as well as the Windows-style functions. It is possible to write sockets-based programs that compile for both platforms. Key point: The name "sockets" comes from the TCP/IP term "socket". A socket is minimum information necessary needed to communication on the network: the source/destination IP address, the source/destination port, and the transport protocol (UDP or TCP). 
SOCKet Secure 
SOCKS is a service that allows internal machines behind a firewall/proxy/gateway access to the Internet. Rather than talking to the target machine, clients communicate with the SOCKS server and ask it to relay data to the target machine out on the Internet. Most web-browsers and FTP clients have SOCKS support built in; SOCKS clients can also be installed on client computers to automatically redirect traffic through the socks gateway. Key point: SOCKS servers are frequently misconfigured allowing both outside and inside people to use them. This means that if a hacker wants to hide where they come from, the hacker scans the Internet for SOCKS proxies, then funnel their data through the proxies they find. When victims trace back to the hacker's IP address, they find the open SOCKS server instead. Key point: Abuse through SOCKS servers has become so common on IRC networks that many of them (dalnet, undernet) have begun scanning clients to see if they are running an open SOCKS proxy. They deny access to anybody coming into the networks through such a proxy. Note that users can still use closed proxies (i.e. those available only to internal users). Key point: SOCKS servers listen by default on TCP port 1080. Real world: Most browsers support SOCKS, which you can see in the "proxy" settings configuration tab. You can download generic SOCKS clients and servers from SOCKS v5 is specified in RFRC 1928. 
Socks4 enabled clients as rtelnet, rftp, ... This is version 4.3 of SOCKS, a package that allows Unix hosts behind a firewall to gain full access to the internet without requiring direct IP reachability. It does require a SOCKS server program being run on a hosts that can communicate directly to hosts behind the firewall as well as hosts on the Internet at large. It is based on the original SOCKS written by David Koblas <>. This package includes SOCKSified client programs of finger, ftp, telnet, and whois. A few other SOCKSified clients may be found on, in directory /pub/security/socks.cstc. 
SOCKS4 server for proxying IP-based services over a firewall This is version 4.3 of SOCKS, a package that allows Unix hosts behind a firewall to gain full access to the internet without requiring direct IP reachability. It does require a SOCKS server program being run on a hosts that can communicate directly to hosts behind the firewall as well as hosts on the Internet at large. It is based on the original SOCKS written by David Koblas <>. This package includes the SOCKS server. 
Service Office/Central Office, "SO/CO" 
Simplified OS for Distributed Applications (OS) 
System Optimization and Design Algorithm 
Small Outline Dual Inline Memory Module (DRAM, DIMM) 
Vector based drawing program. It loads and saves subset of SVG (Scalable Vector Graphics) format, a standard maintained by the WWW consortium. Sodipodi user interface should be familiar from CorelDraw and similar drawing programs. There are rectangles, ellipses, text items, bitmap images and freehand curves. As an added bonus both vector and bitmap objects can have alpha transparency and can be arbitrarily transformed. Sodipodi supports multiple opened files and multiple views per file. Graphics can be printed and exported to png bitmaps. 
SOftware Dokumentations- und InformationsSystem 
Standard Operating Environment 
Standards of Excellence 
interpret .so requests in groff input 
Secondary Operand Execution Pipeline (Motorola, CPU), "sOEP" 
[davenport] Standard Open Formal Architecture for Browsable Electronic Documents 
Soft Links
To demonstrate a soft link, try the following: touch myfile; ln -s myfile myfile2; ls -al; cat > myfile; a few lines of text; ^D; cat myfile; cat myfile2; Notice that the ls -al listing has the letter l on the far left next to myfile2, and the usual - next to myfile. This indicates that the file is a soft link (also known as a symbolic link or symlink) to some other file. A symbolic link contains no data of its own, only a reference to another file. It can even contain a reference to a directory. In either case, programs operating on the link will actually see the file or directory it points to. One of the common uses of symbolic links is to make mounted (see Section 19.4) file systems accessible from a different directory. For instance, you may have a large directory that has to be split over several physical disks. For clarity, you can mount the disks as /disk1, /disk2, etc., and then link the various subdirectories in a way that makes efficient use of the space you have. Another example is the linking of /dev/cdrom to, say, /dev/hdc so that programs accessing the device file /dev/cdrom (see Chapter 18) actually access the correct IDE drive. 
software bloat
n. The results of second-system effect or creeping featuritis. Commonly cited examples include ls(1), X, BSD, Missed'em-five, and OS/2. 
Section OverHead 
Start Of Header 
Small Office / Home Office [market] 
Silicon-On-Insulator [technology/wafer] (IC, IBM) 
Summary Object Interchange Format (WWW) 
Small-Outline J-lead [chip] (IC, DRAM) 
Simulation-Oriented Language 
Collect the boxes and don't become mad Solarwolf is an action/arcade game written entirely in Python, featuring amazing graphics and cool music. It is is originally based on the SolarFox game on the Atari 2600. All this, yet the best feature of all is; it is a hecka lotta fun! The point of the game is to scramble through 48 levels of patterns, collecting all the boxes. The part that makes it tricky is avoiding the relentless hailstorm of fire coming at you from all directions. 
Ear training program for GNOME GNU Solfege is an ear training program for X Window written in python, using the GTK+ and GNOME libraries. Ear training is a big subject with many connections to music theory and performance of music, so I won't even try to make "a complete computer-based eartraining course". But I hope someone find this software useful. 
POP3 server supporting Maildir, PAM, vhosting The Solid POP3 Server is an implementation of a Post Office Protocol version 3 server that has flexibility as its main goal. The server is easily configurable and has support for features such as: - APOP authentication scheme - virtual hosting - maildir and mailbox handling - bulletins - expiration of messages 
Support of Localized Service Areas (ETSI), "SoLSA" 
Self-Organizing Machine 
Structured Object Method 
System Object Model (IBM, ORB, CORBA) 
Small Office Network Data System 
Synchronous Optical NETwork (FDDI, ATM) 
email notifier GNOME applet Sonicmail is a POP3 email notifier GNOME applet. It will notify you when you receive new emails by displaying a selectable icon in the applet. Also, optionally, a sound may be played. Sonicmail is fully configurable. 
Standard Operating Procedure 
This distribution was created by the original Sorcerer GNU/Linux author, Kyle Sallee. Sources are downloaded directly from software authors' homepages and mirrors. Then, they are compiled with the architecture and optimizations that the system administrator specifies. Finally, it is installed, tracked, and archived for easy removal and upgrades. Sorcerer has both both command line and menu driven package mangement programs. A public beta, not backward compatible with previous releases of SGL, was made available April 14, 2002. 
An operation that rearranges data so it is specified ascending or descending order, usually alphabetically or numerical. 
sort lines of text files 
a simple mail sorter sortmail is a simple mail sorter you can use in your .forward to sort your mail into folders automatically, delete unwanted mail, etc. 
Share Operating System (OS) 
Sophisticated Opearting System (OS, Apple) 
Standards and Open Systems 
Support On Site 
Symbolic Operating System (OS) 
System Operational and Support Plan 
SOT Linux
SOT Finnish Software Engineering Ltd. provides a very popular distribution (once known as Best Linux) with excellent language support for many languages. SOT Linux 2002 was released April 24, 2002. 
State of the Art (slang) 
Direct-to-disk recording and play-back programs. sound-recorder is a direct-to-disk recording program. It uses the recording input from the mixer on your soundcard and records it to a file cdsound-recorder is an enhancement to sound-recorder which makes it easy to record tracks or samples from a cdrom to a file. With the play-sample program you can play the recorded audio or play all other non-compressed and compressed wave-files. 
play a raw audio file and interactively select and save pieces From the perl department of the Maximegalon museum of diseased imaginings. soundgrab is a script that lets you interactively select and save your favorite parts of a raw audio file to other files via a command line interface. It does this by providing you with the basic commands you would expect from an audio cassette deck (play, stop, ff, rw) plus some additions: mark, which places a marker at the current position of the head, and export, which saves the audio data between the mark and the current head position to a file you specify in wav, cdr (cd mastering), raw data, flac, or ogg format. 
Sound Card Amateur Packet Radio Modems This package contains the driver and diagnostic utility for the userspace SoundModem suite by Thomas Sailer. This package allows you to use any soundcard supported by the kernel as an Amateur Packet Radio modem. 
Sound module editor/player. Supports .xm modules, .xi instruments. Soundtracker is a module tracker for the X Window System and Gnome similar to the DOS program `FastTracker', i.e. the user creates music by rearranging sound samples into `tracks'. For more information about tracking, see 
n. [very common] In reference to software, `source' is invariably shorthand for `source code', the preferred human-readable and human-modifiable form of the program. This is as opposed to object code, the derived binary executable form of a program. This shorthand readily takes derivative forms; one may speak of "the sources of a system" or of "having source". 
Source code
In a high-level programming language, the typed program instructions that progammers write before the program is compiled or interpreted into machine language instructions the computer can execute. 
Source Code
Programming commands in their raw state as input by a programmer. Some programming languages allow the commands to be executed on the fly by a program interpreter. Other languages require the commands to be compiled into executable programs (binaries) before they can be used. In the UNIX/Linux world, some software is distributed as source code only; other packages include both source and binaries; still others are distributed in binary format only. 
source code
Specially written instructions by a software programmer to create executable programs when run through a compiler or language interpreter. 
source code
The form in which a computer program is written by the programmer. Source code is written in some formal programming language which can be compiled automatically into object code or machine code or executed by an interpreter. 
Source Mage GNU/Linux
Currently called Source Mage GNU/Linux, this project was created by members of the Sorcerer GNU/Linux team after that project was pulled by its creator in March 2002. Sorcery 0.1.3 was released into cvs on March 26, 2002. An up-to-date, working test ISO was released May 30, 2002. Sorcery version was released August 25, 2002. 
source route
In network network protocols, source routing is the capability whereby the sender can specify the route a packet should take. Analogy: Somebody asks you how to get to the freeway. You can give them two responses: You tell them to drive a little further on, and there will be signs pointing to the freeway. You tell them just to follow the signs. This is normal routing: you simply hand the packet off to the routers, and let them worry about which direction the packet takes. You tell them to drive up 3 blocks, turn left, then go 2 blocks, then turn right, then go one more block and bear left onto the onramp. This is source routing: you tell the packet every hop it should take through the network. Key point: The hacker can give the packets routes that go around firewalls. 
A new phenomenon in the free software community is the SourceForge web site, Developers can use this service at no charge to host their project's web site, FTP archives, and mailing lists. SourceForge has mushroomed so rapidly that it has come to host the better half of all free software projects. 
Integrated development project framework This package provides many services a development project can use, such as bug-tracking, task management, mailing-lists, CVS repository, forums, support request helper, web page / FTP hosting, release management, etc. All these services are integrated into one web site. They are managed via a nice web interface. 
Source code analysis, editor, browser and build tool. Source-Navigator is a source code analysis tool which lets users to edit, browse and build their projects. With it, you can edit your source code, display relationships between classes and functions and members, and display call trees. You can also build your projects, either with your own makefile, or by using Source-Navigator's build system to automatically generate a makefile. Source-Navigator works with the Insight GUI interface for GDB. 
A universal sound sample translator. SOX (SOund eXchange) is a generic utility for translating sound files from one format to another, possibly performing a sound effect at the same time. 
Sound EXchange [software] 
SoX (Sound eXchange) is a sound file format converter for Linux, UNIX and DOS PCs. The self-described 'Swiss Army knife of soundtools,' SoX can convert between many different digitized sound formats and perform simple sound manipulation functions, including sound effects. Install the sox package if you'd like to convert sound file formats or manipulate some sounds. 
James Clark's SGML parsing tools This package is a collection of SGML/XML tools called SP. These tools are used to parse, validate, and normalize SGML and XML files. The central programs included in this package are 'nsgmls', which replaces sgmls, 'spam', 'spent', 'sgmlnorm', and 'sgml2xml'. Author: James Clark <> Homepage: 
Service Pack (MS, Windows NT) 
Service Provider (DMI) 
Signal Processor 
SPare (IMEI, GSM, mobile-systems) 
Speculative Precomputation 
Speech Processing 
Stack Pointer [register] (CPU, Intel, assembler) 
Structured Programming 
System Product 
Software Publishers Association (org., USA) 
A 3D space combat simulator Orbit is a 3D space combat simulator. It features realistic Newtonian physics and actual images of the planets. In Orbit, you can fly your space ship to explore the planets and moons of the solar system, or if you're feeling like some action, you can hunt down and destroy alien invaders. 
Star map viewer and navigator SpaceChart is a program to display 3d maps of stars and move freely around it. It is capable of showing only a subset of the stars in a given data file, and only those within a given distance of the center of the display. Also, it shows lines between stars that are closer than a given distance. 
Statistical Packet Anomaly Detection Engine (Snort, IDS) 
[european] Standards Promotion and Application Group (org., manufacturer, Europe) 
Spaghetti code
A poorly organised prorgam that results from excessive use of GOTO statements, making the program almost impossible to read and debug. The cure is to use a well-structured programming language, such as QuickBASIC, C, or Pascal, that offers a full set of control structures. See structured programming 
A popular canned meat product. Also, sending unwanted messages to a public forum, possibly a reference to the famous Spam sketch Spam Sketch by Monty Python. 
an SGML markup stream editor 
Most spam comes through open SMTP relays. Spam is generally sent through the SMTP mail transfer protocol, though spammers are increasingly making use of web-based e-mail. A big source of spam comes from people who spider websites looking for web-pages that contain e-mail addresses. Since a lot of a web-sites will archive mailing lists and USENET groups, posting to a "private" list will often still expose your e-mail address. The SirCam worm of 2001 spidered the HTML files on the local web-browser cache to forward e-mail, creating a hugely effective manner for discovering new e-mail addresses. Spammers will usually spoof their e-mail address -- you can virtually never reply to the "sender" e-mail address. Netiquette: Use Bcc to send to multiple recipients rather than Cc: or To: fields in order to avoid exposing friends e-mail addresses to potential spammers. Firewalls don't block spam. The @Home cable modem ISP now regularly scans its customers for open USENET relays that spammers often hijack in order to forward spam on newsgroups. Some people are so emotionally against spam that they will will completely shun all access from networks known to be sources of spam. Websites will sometimes scan clients with SNMP or NetBIOS in order to discover their login name. Likewise, some websites sift HTTP fields for usernames (though virtually all web-browsers have disabled this feature). A Rumpelstiltskin attack is where a spammer sends e-mail to all possible names (,,, ...) at a domain. This is similar to a brute-force attack. 
see superfluous pieces of additional mail (SPAM). 
Send Phenomenal Amounts of Mail (Usenet, EMP, slang) 
Spiced Pork and hAM (Usenet, EMP) 
vt.,vi.,n. [from "Monty Python's Flying Circus"] 1. To crash a program by overrunning a fixed-size buffer with excessively large input data. See also buffer overflow, overrun screw, smash the stack. 2. To cause a newsgroup to be flooded with irrelevant or inappropriate messages. You can spam a newsgroup with as little as one well- (or ill-) planned message (e.g. asking "What do you think of abortion?" on soc.women). This is often done with cross-posting (e.g. any message which is crossposted to alt.rush-limbaugh and alt.politics.homosexuality will almost inevitably spam both groups). This overlaps with troll behavior; the latter more specific term has become more common. 3. To send many identical or nearly-identical messages separately to a large number of Usenet newsgroups. This is more specifically called `ECP', Excessive Cross-Posting. This is one sure way to infuriate nearly everyone on the Net. See also velveeta and jello. 4. To bombard a newsgroup with multiple copies of a message. This is more specifically called `EMP', Excessive Multi-Posting. 5. To mass-mail unrequested identical or nearly-identical email messages, particularly those containing advertising. Especially used when the mail addresses have been culled from network traffic or databases without the consent of the recipients. Synonyms include UCE, UBE. 6. Any large, annoying, quantity of output. For instance, someone on IRC who walks away from their screen and comes back to find 200 lines of text might say "Oh no, spam". The later definitions have become much more prevalent as the Internet has opened up to non-techies, and to most people senses 3 4 and 5 are now primary. All three behaviors are considered abuse of the net, and are almost universally grounds for termination of the originator's email account or network connection. In these senses the term `spam' has gone mainstream, though without its original sense or folkloric freight - there is apparently a widespread myth among lusers that "spamming" is what happens when you dump cans of Spam into a revolving fan. Hormel, the makers of Spam, have published a surprisingly enlightened position statement on the Internet usage. 
Spam (or Spamming)
An inappropriate attempt to use a mailing list, or USENET or other networked communications facility as if it was a broadcast medium (which it is not) by sending the same message to a large number of people who didn?t ask for it. The term probably comes from a famous Monty Python skit which featured the word spam repeated over and over. The term may also have come from someone?s low opinion of the food product with the same name, which is generally perceived as a generic content-free waste of resources. (Spam. is a registered trademark of Hormel Corporation, for its processed meat product.) 
Perl-based spam filter using text analysis This package contains a script that is designed to be called from a user's .forward or .procmailrc file, and acts to filter out all junk or spam e-mail. It also contains a daemon and client (written in C) designed for high load servers, reducing loading overhead. It includes automatic white-listing, RBL testing, and header and body testing for common spam contents. With librazor-perl, it also checks messages against an online collaborative database. 
Filter spam from incoming mail This package contains a framework to make it easy to filter spam (i.e. junk email) from your incoming mail. It is intended as a user-controlled filter instead of being attached to the MTA as would otherwise be required. All a user has to do is run "spamfilter" and edit one file to set personal information (email addresses, etc.) to have a fully functional spam filter on their incoming mail. Once installed, the filter is infinitely customizable by the user via the rules of procmail. 
Simple Protocol for ATM Network Signalling (ForeRunner, ATM) 
Secure Password Authentication Protocol 
Shiva Password Authentication Protocol (PAP, 3Com) 
Scalable Processor ARChitecture (Sun) 
Standard Planning And Requirement Committee (ANSI, org.) 
Speech Pronounciation Analysis Training (Uni Mainz), "S.P.A.T." 
a simple TeX DVI previewer with a simple GTK+ UI spawg is a simple TeX DVI(DeVice Independent) file previewer for the X Window System. It has no color support, but anti-aliasing is still supported. Unlike spawx11, it has a humble but comfortable GTK+ frontend. No-anti-aliasing version (spwg) is also included, too. This is a part of the TeX-Guy distribution. 
to create a child process in a multitasking operating system. Eg. Linux's fork system call. 
a simple TeX DVI previewer for X11 spawx11 is a simple TeX DVI(DeVice Independent) file previewer for the X Window System. It has no color support, but anti-aliasing is still supported. No-anti-aliasing versions (spwx11 and spx11) are also included, too. This is a part of the TeX-Guy distribution. 
SCSI-3 Primary Commands (SAM, SCSI) 
Solution Partner Center (IBM) 
Stored Program Command 
Stored Program Control 
Service Point Command Facility (IBM) 
Stored Program Control Systems 
Serial Presence Detect (EEPROM, SDRAM) 
Software Product Description 
Software Products Division 
Serial Presence Detect - Electronical Erasable Programmable Read Only MemorySerial Presence Detect (EPROM, IC, ROM), "SPD-EEPROM" 
Sony/Philips - Digital Interface Format (audio, Sony, Philips), "S/P-DIF" 
Standard Page Description Language (ISO, IEC, IS 10180) 
Shared Private Data Network 
Session Protocol Data Unit (OSI, PDU, OSI/RM) 
Symbolic Programming Environment 
Synchronous Payload Envelope 
Tcl/Tk speaker-phone application speaker is a speaker-phone application for US Robotics and Rockwell voice modems. If your modem has a speaker-phone feature implemented in hardware, then you can use speaker to control your modem. 
System Performance Evaluation Corporation (org., RISC) 
Tools to ease the creation of rpm packages for the Mandrake Linux distribution. Compress man pages using bzip2, strip executables, convert links... 
special characters
Non-alphanumeric characters such as !, @, ^, *. 
The specspo package contains the portable object catalogues used to internationalize Red Hat packages. 
Fast 48k ZX Spectrum Emulator (common files) Spectemu emulates the 48k ZX Spectrum, which uses the Z80 microprocessor. This package contains common configuration files and utilities which are or can be used by either the X11 or the SVGAlib frontend. It emulates the Z80 processor as well as the 48k Spectrum's other hardware: keyboard, screen, sound, tape I/O. The emulation is very close to the real thing, but it is still quite fast (It was reported to be working well on a laptop with 486 at 25MHz!). On the other hand, the user interface is not the best. Features include: - Sound support through Linux kernel sound-card driver. - Snapshot saving and loading (.Z80 and .SNA format) - Tape emulation: loading from tape files (.TAP and .TZX format) - Optional quick loading of tapes. - Saving to tape files. - Separate utility to save tape files to real tape - Configurable with config files and from command line 
Spectra Linux
Finnish company Probatus Oy makes Spectra Linux. Designed for workstation and server use, this distribution comes with lots of extras, including the Probatus Spectra SDK application development environment, which supports all most common operating systems. Initial public release on April 17, 2002. 
Edinburgh Speech Tools - user binaries This package contains the various highly useful (to speech scientists, at least) utility programs that use and accompany the Edinburgh Speech Tools Library. 
Dired on steroids Speedbar is an Emacs Lisp program which allows you to create a special skinny frame with a specialized directory listing in it. This listing will have both directories and filtered files in it. You can then load files into your emacs frame, or expand the files to display all the tags that are in them and jump to those tags. You can also expand multiple directories into your speedbar frame. 
speed up perl scripts by making them persistent. SpeedyCGI is a way to run perl scripts persistently, which usually makes them run much more quickly because it avoids the overhead of starting up a new perl interpreter and compiling the perl code. It is most often used for CGI scripts but it can be used to speed up most perl programs. 
GNU Spell, a clone of Unix `spell' GNU Spell is a spell checking program which prints each misspelled word on a line of its own. It is designed as a clone of the standard Unix `spell' program, and implemented as a wrapper for Ispell. Spell accepts as its arguments a list of files to read from. Within that list, the magical file name `-' causes Spell to read from standard input. In addition, when called with no file name arguments, Spell assumes that it should process standard input. 
The classic hand-waving multi-player X game of spellcasting. Spellcast is a classic game of might and magic for the X Windowing System. Two or more wizards duke it out with spells, summons, and plain old poking with fingers. Good for hour[s] of fun. 
Utilities to spell-check selectively Spellutils is a suite of programs which are used to isolate some parts from various types of files and hand them over to another program which may change the texts; it is typically a spell checker. Afterwards the possibly changed text parts are copied back in place in the original file. The newsbody program is intended for use on mail and news messages; it can e.g. ignore headers, quoted material and signatures. The pospell program is for use on translated strings in .po files. 
print SGML entity on the standard output 
Structured Programming Facility 
speech recognition utilities Sphinx 2 is a real-time, speaker-independent speech recognition system. This package contains examples and utilities that use Sphinx. It also includes a sample language model that is capable of recognizing simple commands like "go forward ten meters" and other commands one might use to tell a robot where to move. 
speech recognition library - default acoustic model Sphinx 2 is a real-time, speaker-independent speech recognition system. This package contains an acoustic model for Sphinx-II trained for close-talking microphones. It is the default acoustic model used by the demos, and should provide adequate performance for most desktop applications. 
SCSI-3 Parallel Interface (SAM, SCSI) 
Security Parameter Index 
Serial Peripheral Interface 
Service Provider Interface (WOSA) 
Software Products International (manufacturer) 
Sony Vaio controller program to set LCD backlight brightness spicctrl is a small program that can use the Sony Programmable I/O Control device (SPIC), which is part of Sony Vaio's, to do a few simple things. Currently, it can only be used to control the brightness on the LCD backlight, and print out some information about the battery. You need a kernel with the sonypi module (and a Vaio laptop..) to use this program. 
Scalable Parallel Intelligent Communications Engine 
Simulation Program with Integrated Circuit Emphasis 
Spare Parts Inventory Control System (MBAG) 
Service Profile IDentifier (ISDN) 
Service Protocol IDentifier 
A two deck solitaire game for the X Window System. Spider is delivered in two forms: small.spider is for systems without high resolution screens so the board will fit on the screen; round.spider has prettier card backs but takes up more room on the screen. The default is round.spider. If you wish to use small.spider, either call it directly, or change the link /usr/X11R6/bin/spider to point to small.spider instead of round.spider. 
An automated program that reads webpages from a website, then follows the hypertext links to other pages. If the Internet is a "web", then a spider is something that follows the strands of the web. Key point: A website can use the file "robots.txt" to give hints to spiders what they should, or should not, index. A big problem with websites is that spiders are really good at finding webpages, even those that website operators don't care to be exposed. However, users can still find these pages due to hits from search engines. Website operators can therefore "hide" pages by listing them in "robots.txt". However, hackers will therefore read "robots.txt" in order to find webpages that website operators want hidden. Example: Spammers use spiders to sift through web pages looking for e-mail addresses. For example, if you have a link that looks like <A HREF="">me</A> then the spam spider will find the address and funnel spam to you. A partial defense against this is to URL-encode your e-mail address, which hides it from most spam spiders, but works in most browsers. See the page at for an example. Contrast: A spider pulls information inward; a worm pushes itself outward to other systems. A spider is a type of 'bot, rather than infectious malware like viruses, trojans, or worm. 
Sponsored Programs Information Network 
Simple Public-Key [GSS-API] Mechanism (GSS, RFC 2025) 
Set Priority Level (Unix) 
Simple Programming Language 
Systems Programming Language (HP, MPE, ALGOL, HP 3000) 
a splash screen renderer 
Splack is a volunteer effort set up to continue work on the now defunct Slackware Sparc port. They try to track the official Slackware for Intel tree, which is the original Linux distribution. Slackware is based on the KISS (Keep It Simple - Stupid) principle, which makes it easy to maintain for anyone with a bit of Unix experience. Not a lot of point & click setup tools here. Splack v-y1test was released September 30, 2001. 
standalone program to do the same thing 
a splash screen renderer 
Sound player for MPEG-1,2 layer 1,2,3 Based on maplay, this package decodes layer I, II, and III MPEG audio streams and plays them from the command line using a CD-quality audio device. It uses far less computing power than one commercial equivalent, "l3dec". 
Akima spline interpolation. spline(1) interpolates an Akima-spline trough a series of given points. The Akima-spline interpolation approximates a manually drawn curve better than the ordinary splines, but the second derivation is not continuous. 
Splint scans C code for mistakes and bad style. 
Creates one or more output files (as many as necessary) containing consecutive sections of the infile, or the standard input if none is given or the name `-' is given. By default, split puts 1000 lines of the input file, or whatever is left if it is less than that, into each output file. 
A program that splits mail-digests. It takes a digest from a file specified on the command line or STDIN and writes a mbox-format (Elm, Pine, VM, mailx, etc) folder with the digest. I have it preconfigured for Debian-User and Debian-Changes, but it is easily configured for any type of digest. 
run two programs in a split screen A utility to split a vt100 compatible screen into two halves, upper and lower, and run a different program simultaneously in each half. 
Session Protocol Machine (OSI, ISO 8327) 
Set Program Mask 
Software Performance Monitor 
Source Program Maintenance 
System Performance Monitor 
System Performance Monitor /2 (IBM, OS/2), "SPM/2" 
Substitution Permutation Network (cryptography) 
Single Point Of Failure 
A systems and network monitoring system -- client programs This package includes the spong applications for monitoring systems and network services, and text based programs for requesting information or acknowledging problems from the spong server Spong is a simple systems and network monitoring package. It does not compete with Tivoli, OpenView, UniCenter, or any other commercial packages. It is not SNMP based, it communicates via simple TCP based messages. It is written in perl and easily modifiable. Its features include: * client based monitoring (CPU, disk, processes, logs, etc.) * monitoring of network services (smtp, http, ping, pop, dns, etc.) * grouping of hosts (routers, servers, workstations, PCs) * rules based messaging when problems occur * configurable on a host by host basis * results displayed via text or web based interface * history of problems * verbose information to help diagnosis problems * modular programs to makes it easy to add or replace check functions or features * Big Brother BBSERVER emulation to allow Big Brother Clients to be used 
A systems and network monitoring system -- common libraries This package includes the spong perl libraries, which all spong applications depend on. Spong is a simple systems and network monitoring package. It does not compete with Tivoli, OpenView, UniCenter, or any other commercial packages. It is not SNMP based, it communicates via simple TCP based messages. It is written in perl and easily modifiable. Its features include: * client based monitoring (CPU, disk, processes, logs, etc.) * monitoring of network services (smtp, http, ping, pop, dns, etc.) * grouping of hosts (routers, servers, workstations, PCs) * rules based messaging when problems occur * configurable on a host by host basis * results displayed via text or web based interface * history of problems * verbose information to help diagnosis problems * modular programs to makes it easy to add or replace check functions or features * Big Brother BBSERVER emulation to allow Big Brother Clients to be used 
A systems and network monitoring system -- server programs This package includes the spong daemon, which collects and stores information from the spong client programs, and the program for sending out messages when problems occur. Spong is a simple systems and network monitoring package. It does not compete with Tivoli, OpenView, UniCenter, or any other commercial packages. It is not SNMP based, it communicates via simple TCP based messages. It is written in perl and easily modifiable. Its features include: * client based monitoring (CPU, disk, processes, logs, etc.) * monitoring of network services (smtp, http, ping, pop, dns, etc.) * grouping of hosts (routers, servers, workstations, PCs) * rules based messaging when problems occur * configurable on a host by host basis * results displayed via text or web based interface * history of problems * verbose information to help diagnosis problems * modular programs to makes it easy to add or replace check functions or features * Big Brother BBSERVER emulation to allow Big Brother Clients to be used 
A systems and network monitoring system -- web interface This package includes the programs for displaying the current status and history of the systems and network services, as well as charts of based on logged information when used together with rrdtool, on the World Wide Web. Spong is a simple systems and network monitoring package. It does not compete with Tivoli, OpenView, UniCenter, or any other commercial packages. It is not SNMP based, it communicates via simple TCP based messages. It is written in perl and easily modifiable. Its features include: * client based monitoring (CPU, disk, processes, logs, etc.) * monitoring of network services (smtp, http, ping, pop, dns, etc.) * grouping of hosts (routers, servers, workstations, PCs) * rules based messaging when problems occur * configurable on a host by host basis * results displayed via text or web based interface * history of problems * verbose information to help diagnosis problems * modular programs to makes it easy to add or replace check functions or features * Big Brother BBSERVER emulation to allow Big Brother Clients to be used 
The word "spoof" generally means the act of forging your identity. More specifically, it means forging the sender's IP address (IP spoofing). Analogy: When you send a letter via normal post (snail mail), you write the recipient's name and address on the envelope. You typically also write the sender's name and address as well, so that if there is an error forwarding you letter (e.g. a stamp falls off), they know who sent the letter and can return it. However, you can easily spoof it. For example, someone I know absolutely had to send a letter, but had no stamps. So he simply put the actual recipient's name as the return address section of the envelope and dropped it into the mail box. The letter was returned to sender, which of course arrived at the intended recipient. Misunderstanding: Most people are interested in spoofing because they think it will allow them to hack a machine in a completely anonymous manner. It doesn't work this way. For example, Mitnick used IP spoofing in order to attack Shimomura's computers, but was caught anyway because spoofing does not truly hide the attacker. The problem is that all responses go back to the sender, so if you've spoofed the sender, you'll never see the responses. Therefore, the spoofing is useless for any normal activity. On the other hand, spoofing can still be useful in situations where seeing the response is not necessary. In the Mitnick instance, two machines trusted each other. Therefore, Mitnick was able to emulate and entire connection between the two machines by "predicting" what all the responses would be. He used this connection to open up something on the victim machine that he could then connect to normally. It was precursor scanning the and the post-spoof connection that Shimomura used to catch Mitnick. Example: A particularly nasty form of a spoofing is TCP sequence number prediction. Theoretically, you cannot spoof any protocol based upon TCP connections. This is because both sides of a TCP connection choose their own Initial Sequence Number (ISN). In theory, this is a completely random number that cannot be guessed. In practice, it can sometimes be easily guessed. Mitnick used this technique when hacking Shimomura. As of the end of 1999, operating systems such as Linux, WinNT, and Win2k have implemented truly random ISNs in order to defeat this type of attack. Example: In terms of volume of traffic, the most common use of spoofing today is smurf and fraggle attacks. These attacks spoofed packets against amplifiers in order to overload the victim's connection. This is done by sending a single packet to a broadcast address with the victim as the source address. All the machines within the broadcast domain then respond back to the victim, overloading the victim's Internet connection. Since smurfing accounts for more than half the traffic on some backbones, ISPs are starting to take spoofing seriously and have started implementing measures within their routers that verify valid source addresses before passing the packets. As a consequence, spoofing will become increasingly more difficult as time goes on. Key point: Most of the discussion of spoofing centers around clients masquerading as somebody else. On the other hand, the reverse problem is equally worrisome: hackers can often spoof servers. For example, I post on my website that there is a serious security fix needed to protect yourself while on the web, and point you to and hope that you never notice that the URL is misspelled. You would then go to that site (which would be really my server) and download the patch, which would really be a Trojan Horse that I designed in order to break into your computer. This is why server-side certificates are important: they allow someone to validate that the server isn't bogus. Key point: As the analogy with postal mail shows, many things can be forged, not just the sender's IP address. Most spammers forge their sender's e-mail address in order to avoid all the hate mail they will receive in response. Forging your own sender e-mail address is as simple as reconfiguring your e-mail client -- anybody can do it. (However, there are more secrets to this, which mean you can still be caught by any determined person). Contrast: Blind spoofing describes when you have no knowledge of the responses. Non-blind spoofing is when you are somewhere "in the line of site" as one end of the connection and can sniff some packets. For example, you may spoof a neighbor on the same cable-modem segment. Non-blind spoofing is also used in sniffers like juggernaut to either kill connections or to hijack them. 
vi. To capture, alter, and retransmit a communication stream in a way that misleads the recipient. As used by hackers, refers especially to altering TCP/IP packet source addresses or other packet-header data in order to masquerade as a trusted machine. This term has become very widespread and is borderline techspeak. 
Simultaneous Peripheral Operation On-Line - To send files to some device or program (a `spooler') that queues them up and does something useful with them later. 
Simultaneous Peripheral Operations OnLine 
vi. [from early IBM `Simultaneous Peripheral Operation On-Line', but is widely thought to be a backronym] To send files to some device or program (a `spooler') that queues them up and does something useful with them later. Without qualification, the spooler is the `print spooler' controlling output of jobs to a printer; but the term has been used in connection with other peripherals (especially plotters and graphics devices) and occasionally even for input devices. See also demon. 
Spool (Simultaneous Peripheral Operation On-Line)
To send data to a program that queues up the information for later use (for example, the print spooler). 
spool file
n. Any file to which data is spooled to await the next stage of processing. Especially used in circumstances where spooling the data copes with a mismatch between speeds in two devices or pieces of software. For example, when you send mail under Unix, it's typically copied to a spool file to await a transport demon's attentions. This is borderline techspeak. 
Spool files
Systems services like lpd, innd, sendmail, and uucp create intermediate files in the course of processing each request. These are called spool files and are stored somewhere under the /var/spool/ directory, usually to be processed and then deleted in sequence. 
a powerful Web-based discussion forum. A powerful Web-based discussion forum. Its features include user registration, cookie-based login, a built-in search engine, multiple forums, the ability to customize using the built-in administration package, and much more. Sporum uses SQL server to store data, so postings and searches run on the forum are extremely fast and efficient. 
Scalable Parallel Processing (Intel) 
Sequenced Packet Protocol 
Standard Parallel Port 
Simple Panel Plot Composer This is SPPC (Simple Panel Plot Composer). It can make output to postscript, ppm and gif files, or display in an OpenGL window. It is used by tela, but can also be used standalone. 
Software Problem Report 
SpeicherProgrammierbare Steuerungstechnik 
String Processing System 
Symbolic Programming System 
Special-Purpose Simulation Language 
Statistical Package of the Social Sciences 
Sectors Per Track 
Shortest Path Tree (PIM, ST, Multicast) 
Single Program Transport Stream 
System Processing Unit 
Serial Peripheral Unit Controller/Data Link, "SPUC/DL" 
Storage Pedestal Upgrade Disk / Drive 
Supercomputing Program for Undergraduate Research 
Sequenced Packet eXchange (Novell, Netware) 
spyLinux is (s)mall (py)thon (Linux), a single disk distribution of Linux based on tomsrtbt with mxCGIPython. 
Shielded Quart [cable] 
Signal Quality (MODEM) 
squeeze a sorted word list unsq - unsqueeze a sorted word list 
Software Quality Assurance 
Signal Quality Detector 
Shrink Quad Flat Package (CPU) 
Structured Query Language (ISO 9075, DB, 4GL) 
Structured Query Language is a language for manipulating data in relational databases. It has a very simple grammar and is a standard with wide industry support. SQL-based databases have become the core of the classical client/server database concept. 
SQL (Structured Query Language)
A specialized language for sending queries to databases. Most industrial-strength and many smaller database applications can be addressed using SQL. Each specific application will have its own slightly different version of SQL implementing features unique to that application, but all SQL-capable databases support a common subset of SQL. A example of an SQl statement is: SELECT name,email FROM people_table WHERE contry='uk'. 
SQL (Structured Query Language)
In database management systems, an IBM-developed query language widely used in mainframe and minicomputer systems. SQL is gaining acceptance on local area networks (LANs). SQL is an elegant and concise query language with only 30 commands. The four basic Commands (SELECT, UPDATE, DELETE, and INSERT) correspond to the four basic function d data manipulation (data retrieval data modification, data deletion, and data insertion, respectively). SQL queries approximate the structure of an English natural-language query. A data table consisting of columns (corresponding to data fields and rows (corresponding to data records) displays a query's results. See table oriented database management program. 
SQL (Structured Query Language)
The language used for manipulating records and fields (rows and columns) in a relational database. Sometimes erroneously pronounced "sequel". 
editor of SQL databases, with 'join' capability sql-editor lets the user edit the contents of the tables of a SQL database through a convenient Gtk graphical interface. The user can also select in the database, using an SQL SELECT query, and browse the results. sql-editor does not create tables, nor it does any other administrative task: you may use mysql-navigator for these. sql-editor is aware of joins (which can be specified by using reg.expressions) THIS EDITOR IS VERY YOUNG AND NOT THROUGHLY TESTED. DO NOT USE IT TO EDIT VALUABLE DATA. (though it should be safe to use it to browse data) sql-editor uses the python module dbGtk, which is included in this package; this module provides classes that automatically parse the structure of SQL tables and prepare Gtk widgets to edit the entries of the tables; these classes rely on a backend module that should be compatible to Python db-api 2.0. dbGtk has been tested on mySql databases, using the module MySQLdb; it may work on PostgreSQL databases, using the module pgSQL 
SQL Call Level Interface (SAG, SQL), "SQL/CLI" 
Structured Query Language Descriptor Area (SQL) 
SQL Distributed Management Objects (MS, SQL Server, OLE, DB) 
Structured Query Language/Data System (IBM, VMS), "SQL/DS" 
A command line interface for SQLite SQLite is is a C library that implements an SQL database engine. Programs that link with the SQLite library can have SQL database access without running a separate RDBMS process. 
Structured Query Language - Java (SQL, Java, DB, ANSI, NCITS) 
Software Quality Management 
commandline SQL client for MS SQL and Sybase servers sqsh is a flexible commandline utility that uses the freetds libraries to connect to Sybase or Microsoft SQL servers. It is a useful debugging tool for identifying problems with other SQL applications, and it can be used as a productivity tool in its own right: unlike most SQL CLIs, sqsh's interactive shell lets you pipe the output of SQL queries directly to other Unix commands for further processing. 
Internet Object Cache (WWW proxy cache) This is the Squid Internet Object Cache developed by the National Laboratory for Applied Networking Research (NLANR) and Internet volunteers. This software is freely available for anyone to use. The Squid home page is 
filter, redirector and access controller plug for Squid squidGuard is a free (GPL), flexible and ultra fast filter, redirector and access controller plugin for squid. It lets you define multiple access rules with different restrictions for different user groups on a squid cache. squidGuard uses squid's standard redirector interface. 
Squid log monitoring program Squidtaild is a very fast, highly configurable Perl program that will dynamicly create html pages that display the violations that people made one or more of the filters you have applied to the squid proxy logging system. 
Webmail for nuts SquirrelMail is a standards-based webmail package written in PHP4. It includes built-in pure PHP support for the IMAP and SMTP protocols, and all pages render in pure HTML 4.0 (with no Javascript) for maximum compatibility across browsers. It has very few requirements and is very easy to configure and install. SquirrelMail has all the functionality you would want from an email client, including strong MIME support, address books, and folder manipulation. 
Web-based News/Discussion System SquishDot is a web-based news publishing and discussion product for the Z Object Publishing Environment(ZOPE). It allows you to build a web-based news site along with the capability to handle threaded discussions with a minimum of configuration and day-to-day management. 
Webmail Server This package contains the SqWebMail webmail server. This CGI is used by the Courier mail server to provide webmail access to local mailboxes. SqWebMail is provided here as a separate package that can be used with other mail servers as well. 
Source Routing [bridging] 
Status Register (IC, assembler) 
Static Random Access Memory (RAM, IC, RL) 
Static Resource Affinity Table (ACPI) 
Stream Request Block 
Semiconductor Research Council (org., USA) 
Standard Context Routing (MODACOM) 
System Resource Controller (AIX, IBM) 
A converter from source program files to TeX format files src2tex [resp. src2latex] is a sort of text converter from BASIC, C, C++, OBJECTIVE-C, COBOL, FORTRAN, HTML, JAVA, LISP, MAKE, PASCAL, PERL, SCHEME, SHELL, TCL/TK and ASIR, MACSYMA, MAPLE, MATHEMATICA, MATLAB, MAXIMA, MuPAD, OCTAVE, REDUCE to TeX [resp. LaTeX]. However, it is not a simple pretty-printer; actually, it is designed to fulfill the following desires: (1) We want to write mathematical formulae in comment area of source program. (2) We would like to patch PS or EPS figures upon source program. (3) We need a simple and easy-to-use tool which enables to combine documentation and manual with source program. (4) We often have to translate our program from text format to TeX format when we want to quote our own program in research report, lecture note, etc. That is quite time consuming, so it should be automated. 
Screen Reader System 
Secondary Received Data 
Send and Request Data (Feldbus) 
Symmetrix Remote Data Facility 
Self Routing switch Element (ATM) 
Science Research Foundation (org., UK) 
Service Resource Function (IN) 
Specifically Routed Frame 
Standardized Red Green Blue [colorspace] (RGB, Windows) 
Stanford Research Institute (org., USA) 
System Resources Manager 
Source/Recipient Node (IBM) 
Software Reuse Program 
Source Routing Protocol (IBM) 
Server Requester Programming Interface (IBM, API) 
Scalable Reverse Path Multicast (Multicast) 
Service ReQuest (GPIB) 
Sound Retrieval System (Digital audio) 
Secure Request Technology (banking, cryptography, Java) 
Signal Requests Terminal 
Source Route Transparent [bridges] (ethernet, Token Ring, IEEE 802.1D) 
Speech Reception Threshold 
Synchronous Residual Time Stamp 
SeRVer Installable File System (IBM) 
Single Sided [disk] (FDD) 
Spread Spectrum (WLAN) 
Stack Segment [register] (CPU, Intel, assembler) 
Serial Storage Architecture (IBM) 
Structured System Analysis and Design Method (DB) 
Session Service Access Point (SAP, LLC, OSI/RM) 
Source link Service Access Point (SAP, LLC) 
Station Signaling and Announcement System 
Single SideBand 
Suite Synthetique des Benchmarks de l'AFFU (MP) 
Single SideBand Amplitude Modulation 
SCSI Stream Commands (SAM, SCSI) 
Specialized Systems Consultants 
Service Specific Coordination Function (ATM) 
Service Specific Connection Orientated Protocol (ATM) 
Service Switching & Control Point (IN) 
System Services Control Point (NAU, SNA, SSCP) 
System Services Control Point Network Services (SSCP) 
Service Specific Convergence Sublayer (ATM) 
Solid State Disk (HDD, RAM) 
Synchronous Serial Data Adapter 
Stack Segment Descriptor Cache [register] (SS, Intel, CPU) 
Single-Sided/Double-Density [disk] (FDD), "SS/DD" 
Solid State Disk Drive 
Session Service Data Unit 
Simple Screen Editor 
Software Support Engineer 
Streaming SIMD Extentions (Intel, Pentium, SIMD) 
The super sed stream editor. Super sed reads the specified files or the standard input if no files are specified, makes editing changes according to a list of commands, and writes the results to the standard output. Super sed is an enhanced version of GNU sed 3.02. Relative to 3.02, there are several new features (including in-place editing of files, extended regular expression syntax and a few new commands) and some bug fixes. 
Service Switching Function (IN) 
Solid State Floppy Disk Card (PCMCIA) 
A standard for cryptographic connections over a TCP connection. 
Secure rlogin/rsh/rcp replacement (OpenSSH) This is the portable version of OpenSSH, a free implementation of the Secure Shell protocol as specified by the IETF secsh working group. Ssh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. It is intended as a replacement for rlogin, rsh and rcp, and can be used to provide applications with a secure communication channel. In some countries, particularly Iraq, and Pakistan, it may be illegal to use any encryption at all without a special permit. 
Secure SHell (Unix, Shell) 
See Secure Shell (SSH). 
The Secure Shell, or SSH, provides a way of running command line and graphical applications, and transferring files, over an encrypted connection, all that will be seen is junk. It is both a protocol and a suite of small command line applications, which can be used for various functions. SSH replaces the old Telnet application, and can be used for secure remote administration of machines across the Internet. However, it also has other features. SSH increases the ease of running applications remotely by setting up X permissions automatically. If you can log into a machine, it allows you to run a graphical application on it, unlikt Telnet, which requires users to have an understanding of the X authentication mechanisms that are manipulated through the xauth and xhost commands. SSH also has inbuilt compression, which allows your graphic applications to run much faster over the network. SCP (Secure Copy) and SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is cross-platform. You can find SSH server and clients for Linux, Unix and all flavours of Windows, BeOS, PalmOS, Java and embedded Oses used in routers. From Advanced Linux Pocketbook
adds RSA or DSA identities to the authentication agent 
authentication agent 
under X, asks user for a passphrase for ssh-add This is Jim Knoble's free implementation of the ssh-askpass program. Jim calls this x11-ssh-askpass, but I've decided to call it ssh-askpass to make it easier to find, because this is almost certainly the version you want. The other two versions from the OpenSSH source are also available if you're interested (as ssh-askpass-ptk and ssh-askpass-gnome). The non-free implementation is no longer being packaged. Its source is still available, as part of ssh-nonfree's source. 
under X, asks user for a passphrase for ssh-add This has been split out of the main ssh package, so that the ssh will not need to depend upon the Gnome libraries. You probably want the ssh-askpass package instead, but this is provided to add to your choice and/or confusion. 
install your in a remote machine's authorized_keys 
authentication key generation, management and conversion 
gather ssh public keys 
Secure rlogin/rsh/rcp replacement (OpenSSH with Kerberos) This is the portable version of OpenSSH, a free implementation of the Secure Shell protocol as specified by the IETF secsh working group. Ssh (Secure Shell) is a program for logging into a remote machine and for executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. It is intended as a replacement for rlogin, rsh and rcp, and can be used to provide applications with a secure communication channel. This version of OpenSSH has been compiled with patches enabling Kerberos authentication for protocol versions 1 and 2. -------------------------------------------------------------------- In some countries, particularly Iraq, and Pakistan, it may be illegal to use any encryption at all without a special permit. 
OpenSSH SSH daemon 
Server Side Include [script] (HTTPD, CGI) 
Small Scale Integration 
Software Systems Interface 
[Schwedisches Strahlenschutzinstitut] (Sweden, org.) 
SSI (Server-Side Includes)

Subject Says It All (slang) 
Single [RAS] Single Inline Memory Module (IC, RAS), "S-SIMM" 
Provides a "secure" (i.e. encrypted connection) between the web-browser and the web-server so that the data cannot be sniffed. SSL is used primarily for HTTP, but can also be used for other protocols such as FTP or Telnet. SSL provides three key features: digital-signatures to verify the identity of both the client and server, encryption to prevent the eavesdropping of data, and hashing to protect the integrity of the data. Key point: Web servers have a certificate signed by a trusted certificate authority (CA). This certificate allows the client and the server to generate random keys for the session and to exchange them securely (to defend against man-in-the-middle attacks). The generated random key is used to encrypt the rest of the contents of the connection, usually using RC4. U.S. export controls attempts to limit products used abroad to only 40-bits of key length, which can easily be broken. Key point: In SSL, the server first authenticates itself with the client (a technique that makes it more likely that e-commerce vendors are reputable). Therefore, if you want to set up your own SSL-based web server, you need to get a signed certificate from a CA. Furthermore, if you are outside the U.S., you will find it difficult to find one for 128-bits, though the Chaos Computer Club in Germany manages nicely. Key point: The chief reason SSL isn't used more widely is because it creates a huge performance hit on servers. In particular, the biggest hit comes from handling the public keys in the certificate, though normal encryption/decryption also plays a role. Hardware acceleration for both the public key cryptography and symmetric cryptography are becoming more and more popular. History: SSL was originally developed by Netscape to promote e-commerce. It is also known under the IETF standard name of TLS (Transport Layer Security) and the URL https://. History: In 1996, Netscape's implementation was found to be deeply flawed (i.e. crackable) because of problems in the random number generator. It seeded the generator with the time in seconds and milliseconds as well as the PID (process ID) and PPID (parent process ID). Since these numbers are easy to guess, it gives the random symmetric session key a complexity of roughly 20-bits, which can be easily be brute forced. Subsequent sessions are not re-seeded, which means the discovery of the PRNG seed only needs to be discovered once. Point: SSL allows the encryption algorithm to be negotiated (also known as the "cipher"). Some possible ciphers for SSL are: RC2 with 40-bit keys. RC4 with 40-bit keys. RC4 with 128-bit keys. DES with 40-bit keys. DES with 56-bit keys. Triple-DES with 112/168-bit keys. IDEA with 128-bit keys. Fortezza with 96-bit keys. Point: SSL handshake details: Negotiate cipher Exchange keys Authenticate the server Authenticate the client Authenticate previously exchanged data. 
Secure Socket Layer (Netscape, RSA, WWW, cryptography) 
SSL (Secure Socket Layer)
A protocol designed by Netscape Communications to enable encrypted, authenticated communications across the Internet. 
SSL (Secure Socket Layer)
An Internet security standard proposed by Netscape Communications and incorporated into its Netscape Navigator browser and Netscape Commerce Server software. Unlike its chief competition, Secure HyperText Transport Protocol (Secure HTTP), SSL is application-independent it with all Internet tools, not just the World Wide Web (WWW). Applications that use SSL use public key encryption to ensure that, while information is being conveyed through the Internet, no one can intercept that information. Netscape Communications has released the SSL specification to the Internet community as an open standard. Terisa Systems is currently developing a hybrid SSL/Secure H'TTP specification that ensures that any browser with security features can access any secure Web site. See public key cryptography. security The protection of data so unauthorized users cannot examine or copy it. Mainframe computer systems ensured security by keeping the computer and its mass storage media under lock and key, and allowing access only through remote terminals equipped with displays but no disk drives. Although some experts argue that personal computer local area networks (LANs) should be set up the same way, the excessive centralization of mainframe computer systems was one of the main reasons for the development of personal computers. Concern for security shouldn't prevent a manager from distributing computing power-and computing autonomy-to subordinates. Sufficiently advanced data encryption and password-protection schemes can foil even the most skilled and determined hacker. 
Convenience package to replace ssleay with openssl ssleay was replaced by openssl This package provides, that you get openssl installed when you update ssleay. You can remove this package after the upgrade with: dpkg --remove ssleay 
Secure Socket Layer / Transport Layer Security (RSA, cryptography, TLS), "SSL/TLS" 
Simple TCP service encryption using TLS/SSL sslwrap is a simple Unix service that sits over any simple TCP service such as POP3, IMAP, SMTP and encrypts all of the data on the connection using TLS/SSL. It uses openssl to support SSL version 2 and 3. It can be run out of inetd. It can also encrypt data for services located on another computer. It works with the servers you already have and does not require any modifications to your existing servers. More information can be found at the sslwrap web site . 
Set System Mask 
Simplified Storage Management (HSM) 
Source Specific Multicast (IETF, WG, Multicast) 
Extremely simple MTA to get mail off the system to a mail hub A secure, effective and simple way of getting mail off a system to your mail hub. It contains no suid-binaries or other dangerous things - no mail spool to poke around in, and no daemons running in the background. Mail is simply forwarded to the configured mailhost. Extremely easy configuration. WARNING: the above is all it does; it does not receive mail, expand aliases or manage a queue. That belongs on a mail hub with a system administrator. 
Service Switching Point (IN) 
Silicon Switch Processor (Cisco) 
Standard Printer Port 
Structured Support Program 
Switch to Switch Protocol (DLSW, RFC 1795) 
System Stack Pointer 
System Support Program (OS, IBM) 
Security Support Provider Interface 
Solid-State Relay 
Single-Sided/Single-Density [disk] (FDD), "SS/SD" 
Server to Server Systems Network Architecture (Banyan, VINES), "SS/SNA" 
Simple SIPP Transition (Internet, SIPP) 
South Sumatra Time [+0700] (TZ) 
Screened Shielded Twisted Pair [cable] (STP, TP), "S/STP" 
solar system flight simulator An OpenGL Solar System simulator which includes the sun, the nine planets, a few major satellites, and background stars. 
Seagate Technology (HDD) 
Segment Table / Type 
Shared Tree (PIM, SPT, CBT, Multicast) 
[internet] STream protocol 2 (Internet, ATM, RFC 1819, Multicast) 
Spanning Tree Algorithm 
n. The set of things a person has to do in the future. One speaks of the next project to be attacked as having risen to the top of the stack. "I'm afraid I've got real work to do, so this'll have to be pushed way down on my stack." "I haven't done it yet because every time I pop my stack something new gets pushed." If you are interrupted several times in the middle of a conversation, "My stack overflowed" means "I forget what we were talking about." The implication is that more items were pushed onto the stack than could be remembered, so the least recent items were lost. The usual physical example of a stack is to be found in a cafeteria: a pile of plates or trays sitting on a spring in a well, so that when you put one on the top they all sink down, and when you take one off the top the rest spring up a bit. See also push and pop. At MIT, PDL used to be a more common synonym for stack in all these contexts, and this may still be true. Everywhere else stack seems to be the preferred term. Knuth ("The Art of Computer Programming", second edition, vol. 1, p. 236) says: Many people who realized the importance of stacks and queues independently have given other names to these structures: stacks have been called push-down lists, reversion storages, cellars, nesting stores, piles, last-in-first-out ("LIFO") lists, and even yo-yo lists! 
stack frame
A "stack" in an underlying feature of programming languages like C/C++/Java. Normally, most programmers aren't even aware of the stack. It is important to infosec because subverting this hidden detail is one of the primary ways that hackers break into systems. Example: The following C code fragment shows an example of a stack overflowing: int validate_user() { char username[100];
Symposium on Theoretical Aspects of Computer Science (conference) 
STorage And Information Retrieval System 
An extremely aggressive Scheme compiler. stalin is an aggressive self-hosting Scheme compiler, designed to generate resource efficient stand-alone executables with very high computational performance. It is a batch mode compiler like gcc, not an interpreter, and is designed to be used only after your code has stabilized. It places a few limitations on the content of the source code. For example, you may not not LOAD or EVAL new expressions or procedure definitions at runtime, but in exchange, it is able to perform various global analyses which may allow it to transparently map Scheme types to C types and to use native C arithmetic operations on a per-expression basis, whenever such operations are proven safe. Further stalin can often reduce or eliminate run-time type checking and dispatching, and omit garbage collection for data of limited scope or accessability, while omitting unreachable data altogether. stalin also has a foreign procedure interface to both Xlib and OpenGL. 
Stallman, Richard
The founder of the GNU project, launched in 1984 to develop the free operating system GNU (an acronym for GNU's Not Unix''), and thereby give computer users the freedom that most of them have lost. GNU is free software: everyone is free to copy it and redistribute it, as well as to make changes either large or small. Richard Stallman is the principal author of the GNU C Compiler, a portable optimizing compiler which was designed to support diverse architectures and multiple languages. The compiler now supports over 30 different architectures and 7 programming languages. Stallman also wrote the GNU symbolic debugger (GDB), GNU Emacs, and various other GNU programs. 
Shared-Time Allocation Manager 
Stampede is a development project whose goal is to create the definitive Linux distribution for novice and experienced users alike. It aims to be fast, stable, secure, and to create new innovations and spur new growth of the Linux operating system in a world otherwise saturated with bloated, yet feature-lacking distributions. Stampede development has been on hiatus since March 1, 2002. 
Standard Generalized Markup Language (SGML)
A means of describing markup languages, such as the HyperText Markup Language (HTML), the markup language widely used on the World Wide Web (WWW) . SGML is an open, international standard defined by the International Standards Organization (ISO). 
standard input
The default location where a user enters commands and values, such as a keyboard. 
standard input
the source of information for a command. This is assumed to be the keyboard unless input is redirected or piped from a file or another command. 
standard output
The default location where a computer displays or sends processed data, such as a terminal or console window. 
standard output
the destination for information from a command. This is assumed to be the terminal display unless ouput is redirected or piped to a file or another command. 
A fast posix-compliant tape archiver Star supports several tar archive formats (including ustar, GNU tar and new POSIX format). It's faster than other tar implementations due to advanced buffering. Star is also capable of archiving Access Control Lists, however this package is compiled without ACL support. 
Shareware Trade Association and Resources (org.) 
Star saves many files together into a single tape or disk archive, and can restore individual files from the archive. Star supports ACL. 
an English-Chinese dictionary software for Unix stardic is an English-Chinese dictionary software for Unix. It contains a vocabulary of about 50000 words, some with pronunciation in IPA (International Phonetic Alphabet). Features include rule match and fetching word from screen. It can display either simplified or traditional Chinese font. Home Page: Author: Ma Su An <> 
A 3-dimensional perspective star map viewer StarPlot is a GTK+ based program that can be used interactively to view three-dimensional perspective charts of stars. Charts can be re-centered, rotated, or zoomed in or out with a mouse click (this can also, of course, be done via dialog boxes for more precision). Stars may be viewed (or ignored) by spectral class and absolute magnitude. StarPlot is packaged with starconvert, a utility that converts line-oriented stellar data records to StarPlot format. Most star data files available on the Internet can be converted this way if a short file describing the original file format is provided to starconvert. 
Software Technology for Adaptable Reliable Systems 
start and stop system daemon programs 
Read/Write Motorola StarTac Phone Book Entries via Serial A program with which you read and write entries in your Motorola StarTac PCS (CDMA) phone book For more info see: 
initialize an X session 
wrapper for stat() and statfs calls Display all information about a file that the stat() call provides and all information about a filesystem that statfs() provides. 
statd (rpc.statd, NFS status daemon)
The rpc.statd service is a relatively obscure subsystem of the NFS protocol used primarily on UNIX. It is used so that if an NFS server crashes and comes back alive, it can notify clients that this event happened. Many important vulnerabilities have been found in rpc.statd. This means that while it is not so important to system administrators, it is very important to hackers. History: In 1998, Solaris systems across the Internet were broken into via rpc.statd due to a buffer overflow vulnerability (see Solar Sunrise). In 2000, Linux systems throughout the Internet were broken into via a format string vulnerability. 
n. 1. Condition, situation. "What's the state of your latest hack?" "It's winning away." "The system tried to read and write the disk simultaneously and got into a totally wedged state." The standard question "What's your state?" means "What are you doing?" or "What are you about to do?" Typical answers are "about to gronk out", or "hungry". Another standard question is "What's the state of the world?", meaning "What's new?" or "What's going on?". The more terse and humorous way of asking these questions would be "State-p?". Another way of phrasing the first question under sense 1 would be "state-p latest hack?". 2. Information being maintained in non-permanent memory (electronic or human). 
stateful inspection
A firewall marketing buzzword, stateful inspection implies that the firewall is remembering stuff from previous packets when making the decision whether or not to forward/block the current packet. Stateful inspection is needed to pass classic FTP as well as newer multimedia protocols (NetMeeting, RealAudio, etc.). Example: Class FTP has a separate control connection and data connection. When you connect to an FTP server and request a file, you tell the server to connect back to you. Since most firewalls allow outgoing connections to servers but block incoming connections, you will be able to connect to the FTP server, but you won't be able to retrieve the desired file. Stateful inspection looks at the outgoing connection and notices that you've requested the incoming connection. The firewall opens up a tiny hole allowing just that inbound connection, thus fixing the entire situation. 
Relating to objects (such as system data or network addresses) that do not change; opposite of dynamic. 
static files
Files (such as system configuration files and binaries), that do not change without an action from the system administrator or an agent that the system administrator has allowed to accomplish the task. 
static library
A library where the code needed by the program modules are copied directly into the executable output file. On Linux, static libraries have names like libname.a. They make for larger executables than a shared library. 
Extracts some useful statistics out of a newsgroup. This program may be useful to analyze newsgroups with respect to authors, messages length and frequency, and so on. 
Displays serial port modem status lines Statserial displays a table of the signals on a standard 9-pin or 25-pin serial port, and indicates the status of the handshaking lines. It can be useful for debugging problems with serial ports or modems. 
The statserial utility displays a table of the signals on a standard 9-pin or 25-pin serial port and indicates the status of the handshaking lines. Statserial is useful for debugging serial portand/or modem problems. 
collection of puzzle games similar to Tetris Attack. Another way of playing Tetris and some other cool puzzle games. Multiplayer feature and themes. Have fun ;) 
Software Technical Bulletin 
Science and Technology Center (NSF, USA) 
Secure Transaction Channel (banking, V-One, cryptography) 
SeT Carry [flag] (assembler) 
Standard Transmission Code 
Sub-Technical Committee (ETSI) 
Sub-Technical Committee International User Requirements (ETSI), "STC IUR" 
Secondary Transmitted Data 
SeT Direction [flag] (assembler) 
State Transition Diagram 
Subscriber Trunk Dialing 
Suspend To Disk (BIOS, ACPI) 
StreetTalk Directory Assistance (Banyan, VINES) 
Standard error. A special type of output used for error messages. The file descriptor for STDERR is 2.
STandarD INput 
Standard input. User input is read from STDIN. The file descriptor for STDIN is 0.
Synchronous Time Division Multiplexer 
STandarD OUTput 
Standard output. The output of scripts is usually to STDOUT. The file descriptor for STDOUT is 1.
Section Terminating Equipment (SONET) 
Secure Terminal Equipment 
Spanning Tree Explorer 
Standard Terminal Equipment 
Small/Stupid Text Editor. sted, which is an abbreviation for Small/Stupid (you choose) Text Editor, is a small and/or stupid text editor. So far it doesn't do much. You can edit files, load them and save them. sted has a lot of limitations that you'll probably find quite annoying. It doesn't work very well in an xterm. 
a fast, functional MIDI sequencer STed2 is an open-source MIDI sequencer for Un*x/X platforms. Originally written by the late Takayuki "TURBO" Toda for SHARP X680x0 personal workstation series, it's now ported to GNU/Linux and fully works on ncurses and X! The most distinctive feature of STed2 is its inputting method. STed2 supports "step" inputting, which enables you to input MIDI data incredibly fast. Also supports real-time recording via /dev/midi. 
The practice of hiding one piece of information inside of another. The most common example is watermarking. 
The practice of hiding one piece of information within another. One example is putting an invisible digital watermark in a digitized photograph. 
steganography (stegano, TRANSEC)
In cryptography, steganography refers of not only obfuscating (encrypting) data, but hiding the fact that it even exists. In communications, stegano describes hiding the fact that an attempt has been made to communicate in the first place. History: In ancient times, a messenger would be shaved, then the message would be tattooed onto the skull. The hair would be allowed to grow back in, then the messenger was sent on his way. The recipient would then shave the messenger again in order to retrieve the message. 
A steganography tool Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven. Steghide is designed to be portable and configurable and features hiding data in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data. 
STandard for the External representation / Exchange of Product data definition (ISO, DP 10303, CAD) 
stereogram generator Stereograph is a stereogram generator. In detail it is a single image stereogram (SIS) generator. That is a program that produces two-dimensional images that seem to be three-dimensional (surely you know the famous works of "The Magic Eye", Stereograph produces the same output). You do _not_ need any pair of colored spectacles to regard them - everyone can learn it. 
Short Time Fourier Transformation 
SeT Interrupt [flag] (assembler) 
Standard Tape Interface 
[internet] STream protocol II (RFC 1819) 
Software Technology Interest Group (CERN, org.) 
SmallTalk Interface to X (GNU) 
An efficient Scheme System providing a powerful Object System Based on an ad-hoc Virtual Machine, STklos can also be compiled as a library, so that one can easily embed it in an application. The salient points of STklos are: * efficient and powerful object system based on CLOS providing - Multiple Inheritance, - Generic Functions, - Multi-methods - an efficient MOP (Meta Object Protocol) * a simple to use module system * implements the full tower of numbers defined in R5RS * easy connection to the GTK+ toolkit 
Standard Template Library 
Secure Transport Layer Protocol 
Synchronous Transfer Mode (ATM) 
System Master Tape 
Synchronous Transport Mode 1 (ATM, STM) 
Scientific and Technical Network (network, JICST, FIZ) 
SuperTwisted Nematic Liquid Crystal Display (LCD), "STN-LCD" 
Symposium on Theory Of Computing (conference) 
STructured and OpeN Environment (FZI Karlsruhe, Germany) 
TCP/IP packet repeater in the application layer. TCP/IP packet repeater in the application layer. It repeats TCP and UDP packets from inside to outside of a firewall, or from outside to inside. 
TCP/IP packet repeater in the application layer.(SSL) TCP/IP packet repeater in the application layer. It repeats TCP and UDP packets from inside to outside of a firewall, or from outside to inside. This package was built with SSL support. 
Interface for remotely powering down a node in the cluster. The STONITH module (a.k.a. STOMITH) provides an extensible interface for remotely powering down a node in the cluster. The idea is quite simple: When the software running on one machine wants to make sure another machine in the cluster is not using a resource, pull the plug on the other machine. It's simple and reliable, albeit admittedly brutal. 
kill commands after a given time Run the given command, killing it with a SIGHUP or other signal after a specified amount of time. It forks a child process to kill the parent process and any children if still present. Package also includes the pushafter utility, which waits for a specified time before running the given command. Useful when managing global IRC networks via ssh, as in: pushafter 30s stopafter 600 hup ssh -n -l dancer $host uname -a 
Statistically-Oriented Matrix Program 
Storm Package Manager Storm Package Manager is a GNOME-based user-friendly replacement for the console-based package manager "dselect". Many useful features are available, such as full dependency management, APT source list editing, and package list filtering. 
Organiser for /usr/local/ hierarchy GNU Stow helps the system administrator organise files under /usr/local/ by allowing each piece of software to be installed in its own tree under /usr/local/stow/, and then using symlinks to create the illusion that all the software is installed in the same place. 
Selective Tape Print 
Service Transaction Program (IBM) 
Shielded Twisted Pair [cable] (TP) 
Signaling Transfer Point (IN) 
Software Technology Park 
Software Through Pictures, "StP" 
Spanning Tree Protocol (IEEE 802.1) 
System Training Program 
Synchronous Transmit Receive 
A system call tracer. strace is a system call tracer, i.e. a debugging tool which prints out a trace of all the system calls made by a another process/program. The program to be traced need not be recompiled for this, so you can use it on binaries for which you don't have source. System calls and signals are events that happen at the user/kernel interface. A close examination of this boundary is very useful for bug isolation, sanity checking and attempting to capture race conditions. 
The strace program intercepts and records the system calls called and received by a running process. Strace can print a record ofeach system call, its arguments and its return value. Strace is useful for diagnosing problems and debugging, as well as for instructional purposes. Install strace if you need a tool to track the system calls made and received by a process. 
trace system calls and signals 
capture tool (images / movies) A tool to capture single/multiple images or record movies from a video4linux device. 
A sequence of characters, as in a "search string". 
In computer usage in general, a sequence of characters. 
print the strings of printable characters in files. 
Discard symbols from object files. 
2D strip chart for plotting x and y coordinate data. 
n. Common name for the slant (`/', ASCII 0101111) character. See ASCII for other synonyms. 
structured programming
A set of quality standards that make programs more verbose but more readable, reliable, and easily maintained. The goal of structured programming is to avoid spaghetti code caused by overreliance on GOTO statements, a problem often found in BASIC and FORTRAN programs. Structured programming-such as that promoted by C, Pascal Modula-2, and the dBASE software command language - insists that the overall program structure reflect what the program is supposed to do, beginning with the first task and proceeding logically. Indentations help make the logic clear, and the programmer is encouraged to use loops and branch control structures and named procedures rather than GOTO statements. 
Synchronous Time Stamps 
Synchronous Transport Signal 
Synchronous Transport System - level 3 Concatenated, "STS-3c" 
Secure Transaction Technology (MS, banking) 
Surface Tunnel Tansistor (IC, DRAM, NEC) 
Standard Transistor-Transistor Logic (TTL) 
change and print terminal line settings 
unimplemented system calls 
Secure Telephone Unit 
Stunnel is a socket wrapper which can provide SSL (Secure Sockets Layer) support to ordinary applications. For example, it can be used in conjunction with imapd to create an SSL secure IMAP server. 
Universal SSL tunnel for network daemons The stunnel program is designed to work as SSL encryption wrapper between remote client and local (inetd-startable) or remote server. The concept is that having non-SSL aware daemons running on your system you can easily setup them to communicate with clients over secure SSL channel. stunnel can be used to add SSL functionality to commonly used inetd daemons like POP-2, POP-3 and IMAP servers without any changes in the programs' code. 
Sprint Telecommunications Venture (org.) 
Start of TeXt 
Change user ID or become super-user 
Screening Units 
Selectable Unit 
Signalling Unit 
Storage Unit 
Switch User (Unix) 
A simple script to give an `interactive' front end to su. It can be used in menu entry commands to ask for the root password 
Single User Account [feature] (Internet, NAT) 
A directory within a directory in a hierarchical file system. 
Network nodes that are related by the same IP address range. For example, computers with an address beginning with 192.168.1.x are in the same subnet. 
subnet mask
A 32-bit address used in conjunction with an IP address to segment network traffic; used to restrict transmissions to certain subnets. 
Tool for subverting programs--"strace meets expect" SUBTERFUGUE is a framework for observing and playing with the reality of software; it's a foundation for building tools to do tracing, sandboxing, and many other things. You could think of it as "strace meets expect." [requires 2.4 kernel] 
Small newsfeed from an NNTP server with standard NNTP commands. This package contains software for copying news from an NNTP server to your local machine, and copying replies back up to an NNTP server. The suck/rpost combination allows you to run your own INN/CNEWS site, controlling where you get your news, and where you post outgoing articles. Suck/rpost use only standard NNTP commands that are used by your favorite news reader (like tin, knews, trn) such as POST and ARTICLE. If you can use tin or knews against a NNTP site, than you can use Suck/Rpost and have multiple site feeds. NOTE: Suck will not work with obsolete NNTP servers that can't handle the xhdr command. 
Provides limited super user privileges to specific users. Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done. 
Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on aper-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines. 
Software Update and Distribution System 
Full-text searching tools using suffix array. SUFARY is a very powerful indexing and query system using suffix array. SUFARY can handle one file at a time, and so not suited for searching a word from many files. CAUTION: Documentation for sufary is written in Japanese. 
Tcl/Tk interface for SUFARY. This packages provides kwicview, a Tcl/TK based GUI for array which is a searching program of the SUFARY system. 
Sun User's Group (org., Sun, user group) 
Swedish User Group of Amiga (user group, Sweden) 
Sun User's Group Deutschland (Sun, org., user group) 
Set User ID: a file attribute which allows a program to run as a specific user no matter who executes it. 
SUID (set user ID)
The SUID permission causes a script to run as the user who is the owner of the script, rather than the user who started it. It is normally considered extremely bad practice to run a program in this way as it can pose many security problems. Later versions of the Linux kernel will even prohibit the running of shell scripts that have this attribute set.
Manage File Permissions This package previously managed permissions of files. However, the dpkg-statoverride command is the new way to do that. This package now exists only as a transition package. When it is installed, it will import the old suidmanager database into dpkg-statoverride's database. After that, it may be freely removed. 
Single-user login 
checksum and count the blocks in a file 
Space Ultrareliable Modular Computer (RCA) 
Fancy clock showing time and geographical data sunclock is an X11 application that displays a map of the Earth and indicates the illuminated portion of the globe by drawing sunlit areas dark on light, night areas as light on dark. In addition to providing local time for the default timezone, it also displays GMT time, legal and solar time of major cities, their latitude and longitude, and the mutual distances of arbitrary locations on Earth. Sunclock can display meridians, parallels, tropics and arctic circles. It has builtin functions that accelerate the speed of time and show the evolution of seasons. 
Swedish University NETwork 
SUN Operating System (Sun, OS, SPARC), "SunOS" 
SUN's Visual Integrated Environment for Workstations (Sun, GUI) 
Software Upgrade Protocol implementation The SUP System is a set of programs developed by Carnegie Mellon University that provide for collections of files to be maintained in identical versions across a number of machines. These programs are: SUP: The "client" program, run by users or system maintainers, which initiates the upgrade activity on a machine requesting the latest version of a collection of files. SUP will normally be run as a daemon, firing up once each night (week, etc.) to upgrade the specified file collections. SUPFILESRV: The "file server" program, a daemon that is run by the system maintainer to service requests for files initiated by client SUP programs. The file server runs on every machine used as a "repository" of distributable versions of files. It runs continuously and listens for network connection requests by individual client processes; for each individual client request, a process is forked to service that request. SUPSCAN: The "file scanner" program, that may optionally be run periodically to speed up execution of the file server. It pre-compiles a list of files on the file system that match the specifications for a given file collection so that the file server need not do this during each upgrade of that collection. The file scanner is normally used daily for very large file collections that are upgraded by many clients each day; it is not so useful for small file collections or for those that are upgraded by only a few client machines per day. 
Execute commands setuid root Super allows specified users to execute scripts (or other commands) as if they were root; or it can set the uid and/or gid on a per-command basis before executing the command. It is intended to be a secure alternative to making scripts setuid root. 
Single-port inetd with pre-forking, suited for high-speed servers. superd turns any program that normally talks to stdin and stdout into a high speed server. It's similar in functionality to inetd but it handles only one port per invocation. It uses pre-forking and file descriptor passing to achieve high performance. 
superfluous pieces of additional mail (SPAM)
Unwanted and unsolicited email received by a user that usually does not know the sender and never requested the communication. 
format floppies TQ 
SuperRescue is a single very large bootable system-on-a-disk. It's based on the observation that the vast majority of systems allow you to do so much more than the minimal system. Therefore, it isn't for everything, but for most desktop systems, it provides a much nicer rescue environment than your average rescue floppy. This version furthermore uses transparent compression to fit about 1.4 GB of software onto a single CD in usable form. A CD-based distribution. 
An informal name for root. 
n. [Unix] Syn. root, avatar. This usage has spread to non-Unix environments; the superuser is any account with all wheel bits on. A more specific term than wheel. 
The root user that has administrative rights to all resources on a computer system. 
Usually synonymous with root operator. 
n. After-sale handholding; something many software vendors promise but few deliver. To hackers, most support people are useless -- because by the time a hacker calls support he or she will usually know the software and the relevant manuals better than the support people (sadly, this is not a joke or exaggeration). A hacker's idea of `support' is a tjte-`-tjte with the software's designer. 
Southeastern Universities Research Association NETwork (network, USA), "SURAnet" 
System Utilization Reporting Facility 
v. [from the `surf' idiom for rapidly flipping TV channels] To traverse the Internet in search of interesting stuff, used esp. if one is doing so with a World Wide Web browser. It is also common to speak of `surfing in' to a particular resource. Hackers adopted this term early, but many have stopped using it since it went completely mainstream around 1995. The passive, couch-potato connotations that go with TV channel surfing were never pleasant, and hearing non-hackers wax enthusiastic about "surfing the net" tends to make hackers feel a bit as though their home is being overrun by ignorami. 
The term used by newbies to descripbe exploring the Internet, usually through a World-Wide-Web browser, a metaphor from real surfing. 
a fast unix command line interface to WWW Surfraw - Shell Users' Revolutionary Front Rage Against the World Wide Web Surfraw provides a fast unix command line interface to a variety of popular WWW search engines and other artifacts of power. It reclaims google, altavista, dejanews, freshmeat, research index, slashdot and many others from the false-prophet, pox-infested heathen lands of html-forms, placing these wonders where they belong, deep in unix heartland, as god loving extensions to the shell. Surfraw abstracts the browser away from input. Doing so lets it get on with what it's good at. Browsing. Interpretation of linguistic forms is handed back to the shell, which is what it, and human beings are good at. Combined with incremental text browsers, such as links, w3m (or even lynx), and screen(1), or netscape-remote a Surfraw liberateur is capable of research speeds that leave GUI tainted idolaters agape with fear and wonder. 
Cave surveying and mapping software A software suite to process, view, and print cave survey data. Survex is cross-platform (Linux/Unix, MS Windows, DOS, RISC OS). It includes English, French, German, Portuguese, Catalan, and Spanish internationalisations. It can deal with extremely large and complex datasets and can read survey data from many sources. 
Sophisticated cave survey viewer for Survex Advanced cave viewer for Survex, written using the wxWindows library. Aven supersedes the xcaverot viewer in the main survex package. 
Single Unix Specification (Unix) 
Software Und SystemEntwicklung [distribution] (Linux), "S.u.S.E." 
SuSE Linux
German firm SuSE Linux AG, is the European UnitedLinux partner. SuSE provides a variety of versions of its very popular distribution. SuSE Linux 8.2 became generally available April 14, 2003. For business customers SuSE offers Enterprise Linux 8 and SuSE Linux Desktop. 
System Use Sharing Protocol 
Suspend-Script is launched by apm or acpid on resume and suspend, it start or stop your network/sound etc... to make sure that everything work after hybernation of your computer. 
System Under Test 
Screened Unshielded Twisted Pair [cable] (UTP, TP), "S/UTP" 
Single User Test Tools 
StandortVerteiler (cable, EN 50 173) 
Shared Virtual Area 
System V Application Binary Interface (Unix, AT&T, SCD) 
SuperVisor Call (IBM, VM, VM/ESA) 
Switched Virtual Circuit / Channel / Connection (ATM, PVC) 
Switched Vitual Call / Circuit (IBM, X.25) 
Super Video Compact Disk (CD) 
Switched Virtual Circuit Identifier (SVC, ATM) 
Schweizerische Vereinigung fuer Datenverarbeitung (org., Switzerland) 
Simultaneous Voice/Data 
Supplementary Volume Descriptor (CD, IS 9660) 
Simple Virtual Environment 
System V File System (Unix) 
Scalable Vector Graphics [format] (W3C) 
Super Video Graphics Array (VGA) 
Console SVGA display utilities svgalib provides graphics capabilities to programs running on the system console, without going through the X Window System. It uses direct access to the video hardware to provide low-level access to the standard VGA and SVGA graphics modes. Only works with some video hardware; use with caution. This package contains the Svgalib utility programs. 
SVGA display utilities [libc5 compat] svgalib provides graphics capabilities to programs running on the system console, without going through the X Window System. It uses direct access to the video hardware to provide low-level access to the standard VGA and SVGA graphics modes. Only works with some video hardware; use with caution. This package contains the libc5 compatibility shared libraries. 
Console SVGA display utilities svgalib provides graphics capabilities to programs running on the system console, without going through the X Window System. It uses direct access to the video hardware to provide low-level access to the standard VGA and SVGA graphics modes. Only works with some video hardware; use with caution. This package contains the (libc6) shared libraries and config files. 
Run higher resolution text modes. This program is designed to greatly improve the normal (EGA-based) textmodes on your Linux machine. It uses an Xconfig-like configuration file to set up better looking textmodes. (=higher resolution, larger font size, higher display refresh...) This is already a big boon on normal 14" displays, and it is an immense difference on larger and better (15" and up) screens. It stems from the idea that it is a real waste of hardware to use EGA textmodes on an SVGA-card, which was designed to do much better than that. This package is mainly of use to people with older hardware that is not adequately supported by the Linux framebuffer drivers. If you abhor 80x25 text modes as much as I do but have a modern cpu and video hardware, then building a kernel with framebuffer support is probably a better option. Some newer video cards are not supported by this package at all (but are supported by the kernel fb drivers) WARNING: This program will not work on non-VGA based systems. Installing it will not do any harm, but activating the program can. 
System V Interface Definition (Unix, AT&T, SCD) 
Secure Voice Improvement Program 
Self Voicing Kit (IBM, Java) 
System Virtual Memory Table (BS2000) 
Virtual network computing client software for SVGA. VNC stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing `Desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. It is implemented in a client/server model. This package provides a client for SVGA, with this you can connect to a vncserver somewhere in the network and display its content on a graphic capable console. There are vncserver available for X and for Win95/NT, although the Win95/NT server may not work with svgalib viewer due to missing palette handling. 
SerVice Provider (ETSI, ETSI 201 671), "SvP" 
Single Variable Per Constraint 
Super VGA Protected Mode Interface (VESA) 
System V Release 3 (Unix, OS, AT&T) 
System V Release 4 (Unix, OS, AT&T) 
Single Virtual Space (IBM, OS, OS/SVS) 
Secure WAN ??? (RSA), "S/WAN" 
Sun Wide Area Network (Sun, WAN) 
A storage disk partition used to support virtual memory. Data is written to a swap partition when there is not enough main memory to store the data that a system is processing. 
An important aspect of all operating systems is a feature called "virtual memory". This allows the OS to take unused pieces of memory and write them to disk, then free up the block of memory just written so that another active application can use it. Whenever somebody needs that block again, the operating system will automatically restore it from the disk. Of course, it will then have to free up another block to do so by writing that block to the disk. This technique is generally called "swapping" or "paging". The word "swap" reflects the fact that inactive blocks of memory are being switched with active blocks from the disk. The word "paging" reflects the fact that a common name for a block of memory is "page". The name of the file on the disk that an OS uses for swapping is called the "swapfile" or "pagefile". Key point: A lot of security depends upon the fact that memory is secure: the OS protects applications from reading other application's memory, and that when the computer is turned off, the memory is erased. Therefore, applications can safely store passwords in clear-text in memory. Swapping defeats this, because the memory pages that store the passwords may have been swapped to the disk. Someone with physical access to the machine can turn it off, steal the disk, and run the pagefile through analysis programs in order possibly retrieve passwords. 
Shared Wireless Application Protocol (HomeRF Association, WAP, WLAN) 
Simple Workflow Access Protocol 
to move information from a fast-access memory to a slow-access memory (`swap out'), or vice versa (`swap in'). Often refers specifically to the use of disks as `virtual memory'. 
To temporarily move data (programs and/or data files) from random access memory to disk storage (swap out), or back (swap in), to allow more programs and data to be processed than there is physical memory to hold it. Also called Virtual Memory. 
vt. 1. [techspeak] To move information from a fast-access memory to a slow-access memory (`swap out'), or vice versa (`swap in'). Often refers specifically to the use of disks as `virtual memory'. As pieces of data or program are needed, they are swapped into core for processing; when they are no longer needed they may be swapped out again. 2. The jargon use of these terms analogizes people's short-term memories with core. Cramming for an exam might be spoken of as swapping in. If you temporarily forget someone's name, but then remember it, your excuse is that it was swapped out. To `keep something swapped in' means to keep it fresh in your memory: "I reread the TECO manual every few months to keep it swapped in." If someone interrupts you just as you got a good idea, you might say "Wait a moment while I swap this out", implying that a piece of paper is your extra-somatic memory and that if you don't swap the idea out by writing it down it will get overwritten and lost as you talk. Compare page in, page out. 
swap space
n. Storage space, especially temporary storage space used during a move or reconfiguration. "I'm just using that corner of the machine room for swap space." 
Swap Space
Where swapped data is temporarily stored on disk. Linux uses a dedicated disk partition for swap space, rather than a specific swap file. 
Swap demon for dynamic swap file creation Swapd is a dynamic swapping manager for Linux. It provides the system with as much swap space (virtual memory) as is required at a particular time by dynamically creating swap files. This is more convenient than using fixed swap files and/or partitions because they (a) are unused most of the time and are just taking up disk space; and (b) provide a limited amount of virtual memory. On systems that have constant need for virtual memory it would still be wise to use a swap partition in parallel with dynamic swapping, since swap partitions provide much faster access than swap files. 
enable/disable devices and files for paging and swapping 
start/stop swapping to file/device 
enable/disable devices and files for paging and swapping 
start/stop swapping to file/device 
swapped in
n. See swap. See also page in. 
swapped out
n. See swap. See also page out. 
Samba Web Administration Tool The Samba software suite is a collection of programs that implements the SMB protocol for unix systems, allowing you to serve files and printers to Windows, NT, OS/2 and DOS clients. This protocol is sometimes also referred to as the LanManager or NetBIOS protocol. This package contains the components of the Samba suite that are needed for Web administration of the Samba server. 
log file viewer with regexp matching, highlighting, & hooks Swatch is designed to monitor system activity. It reads a configuration file which contains pattern(s) to look for and action(s) to perform when each pattern is found. A typical action is echoing the matched line in a variety of colours and formats including reverse video, bold, underline, and normal, which swatch knows how to do internally. Other actions include sending mail or executing an arbitrary program on the line. Swatch is written in Perl and uses Perl regular expressions for line matching. This Debian version of swatch includes two directives not yet found in the "official" swatch -- "PERLCODE" and "threshold". 
Thai word segmentation program This is a free word segmentation program from NECTEC. You need this program for thailatex and for creating proper Thai html pages. It is a better choice than cttex. 
[Staatliches Amt fuer Technische Akkreditierung] (Sweden, org.) 
An editor for sound samples An editor for sound samples. It operates on various PCM style files such as .wav, .aiff and .au. Sweep contains filters and effects you can apply to sound. One of its best features is multi-level undo and redo. It also allows discontinuous selections, multiple views of a sound sample and piano-style playback. Further information can be had at 
Steve Harris's LADSPA plugins Steve Harris has written a large number of plugins for LADSPA compatible hosts (e.g. GLAME, Sweep and ecasound). The plugins available are: amp, fast overdrive, overdrive (with colourisation), comb filter, waveshaper, ringmod, divider, diode, decliper, pitch scaler, 16 band equaliser, sinus wavewrapper, hermes filter, chorus, flanger, decimater, oscilator, gverb, phasers, harmonic generators and surround encoders. Further information about his plugins is available at <URL:> 
SoftWare Interrupts (RISC, OS) 
Prolog interpreter. ISO/Edinburgh-style Prolog compiler. Compliant with Part 1 of the ISO standard for Prolog. Covers all traditional Edinburgh Prolog features and shares many features with Quintus and SICStus Prolog, including a compatible module system. Very fast compiler, garbage collection (also on atoms), fast and powerful C/C++ interface, autoloading, GNU-readline interface. SWI-Prolog has been designed and implemented such that it can easily be modified for experiments with logic programming and the relation between logic programming and other programming paradigms (such as the object oriented XPCE environment). SWI-Prolog has a rich set of built-in predicates and reasonable performance, which makes it possible to develop substantial applications in it. The current version offers a module system, garbage collection and an interface to the C language. Home page: 
Schweizerischer Wirtschaftsverband der Informations-, Communikations- und Organisationstechnik (org., Switzerland) 
Society for Worldwide Interbank Financial Telecommunication (org., banking) 
Simplified Wrapper and Interface Generator (SWIG) is a software development tool for connecting C, C++ and Objective C programs with a variety of high-level programming languages. SWIG is primarily used with Perl, Python and Tcl/TK, but it has also been extended to Java,Eiffel and Guile. SWIG is normally used to create high-level interpreted programming environments, systems integration, and as a tool for building user interfaces. 
Super Woz' Integrated Machine 
SWI-Prolog 5.0.0 
deprecated name of SWI-Prolog 
Simple Web Indexing System for Humans (WAIS, WWW) 
Simple Web Indexing System for Humans: C++ version SWISH++ is a Unix-based file indexing and searching engine (typically used to index and search files on web sites). It was based on SWISH-E although SWISH++ is a complete rewrite. SWISH++ was developed to circumvent author's difficulties with using the SWISH-E package. SWISH++ features: * Lightning-fast indexing * Indexes META elements, ALT, and other attributes * Selectively not index text within HTML or XHTML elements * Intelligently index mail and news files * Index Unix manual page files * Apply filters to files on-the-fly prior to indexing * Index non-text files such as Microsoft Office documents * Modular indexing architecture * Index new files incrementally * Index remote web sites * Handles large collections of files * Lightning-fast searching * Optional word stemming (suffix stripping) * Ability to run as a search server * Easy-to-parse results format * Generously commented source code 
Simple Web Indexing System for Humans SWISH-Enhanced is a fast, powerful, flexible, and easy to use system for indexing collections of Web pages or other text files. Key features include the ability to limit searches to certain HTML tags (META, TITLE, comments, etc.). The SWISH-E software is free, and we include a package of Perl programs that enable anyone who is authorized to create and maintain their own indexes (AutoSwish). SWISH-E is an enhanced version of SWISH, which was originally written by Kevin Hughes and modified and released with his permission. 
the mother of all X Toolkit clocks Swisswatch is a reimplementation of der Mouse's mclock program using lightweight X Toolkit objects ("gadgets"). It relies heavily on resources for configuration, and can assume a wide range of looks. The application defaults files distributed with swisswatch currently support an oclock emulation, a Swiss railway clock emulation, and a fancy default appearance. You are encouraged to play with the resources and create your personalized version. 
A device that facilitates transmissions between nodes on a private network and regulates internal network traffic. 
The Desktop Switcher is a tool which enables users to easily switch between various desktop environments that they have installed. 
The switchdesk-gnome package provides a GNOME look and feel for the Desktop Switcher program provided in the switchdesk package. 
The switchdesk-kde package provides the Desktop Switcher with a KDE look and feel. 
Matthew Henry Concise Commentary for SWORD An abridged version of Matthew Henry's commentary on the whole bible. Matthew Henry (1662-1714) was a Presbyterian minister in Chester. His work was long celebrated as the best of English commentaries for devotional purposes. Such as Whitefield and Spurgeon have used the work and commended it heartily. 
World English Bible (WEB) for SWORD The World English Bible is a 1997 revision of the American Standard Version of the Holy Bible, first published in 1901. 
Super eXtended Graphics Adapter / Array 
suid, sgid file and directory checking This program is runs as a cronjob. Basically it tracks any changes in your s[ug]id files and folders. If there are any new ones, ones that aren't set any more, or they have changed bits or other modes then it reports the changes. You can also run this manually for spot checking. It tracks s[ug]id files by md5 checksums. This helps detect if your files have been tampered with, would not show under normal name and permissions checking. Directories are tracked by inodes. 
Show an XPM (X PixMap) file and/or convert XPM 1 or 2 files to XPM 3. 
Light weight e-mail client with GTK+ Light weight e-mail client with GTK+ running on X Window System. And aiming for * Quick response * Graceful, and sophisticated interface * Easy configuration, intuitive operation * Abundant features The appearance and interface are similar to some popular e-mail clients for Windows, such as Outlook Express or so. The interface is also designed to emulate the mailers on Emacsen, and almost all commands are accessible with the keyboard. 
Bleeding edge version of the Sylpheed mail client Sylpheed Claws is a bleeding edge version of the Sylpheed mail client which has the most advanced features designed to be included in Sylpheed. It features the same features Sylpheed does: * Very good performance * Easy configuration and operation * Multiple accounts * High flexibility And more: * Better mail/news composing handling; * More advanced ways of handling headers and attachments; * More powerful handling of MIME types. * Per-folder default reply-to address and threading mode configuration; * Pixmap theming If you care for stability rather than more flexibility, use 'sylpheed' instead. 
The part of an object table that gives the value of each symbol (usually as a section name and an offset) is called the symbol table. Executables may also have a symbol table, with this one giving the final values of the symbols. Debuggers use the symbol table to present addresses to the user in a symbolic, rather than a numeric form. It is possible to strip the symbol table from executables resulting in a smaller sized executable but this prevents meaningful debugging. From 252
Symbolic link
An alias or shortcut to a program or file. 
symbolic-link or soft-link
A special filetype, which is a small pointer, file allowing multiple names for the same file. Unlilke hard links, symbolic links can be made for directories and can be made across filesystems. Commands that access the file being pointed to are said to follow the symbolic link. Commands that access the link itself do not follow the symbolic link. 
symlink (symbolic link)
On UNIX, a symbolic link is where a file in one directory acts as a pointer to a file in another directory. For example, you could create a link so that all accesses to the file /tmp/foo really act upon the file /etc/passwd. This feature can often be exploited. While a non-root user does not have permission to write to administrative files like /etc/passwd, they can certainly create links to them in the /tmp directory or their local directory. SUID can then be exploited whereby they believe they are acting upon a user file, which which are instead acting upon the original administrative file. This is the leading way that local users can escalate their privileges on a system. Example: finger A user could link their .plan file to any other file on the system. A finger daemon running with root privileges would then follow the link to that file and read it upon execution of a finger lookup. 
scan/change symbolic links Symlinks scans directories for symbolic links and lists them on stdout. Each link is prefixed with a classification of relative, absolute, dangling, messy, lengthy or other_fs. Symlinks can also convert absolute links (within the same filesystem) to relative links and can delete messy and dangling links. 
The symlinks utility performs maintenance on symbolic links. Symlinks checks for symlink problems, including dangling symlinks which point to nonexistent files. Symlinks can also automatically convert absolute symlinks to relative symlinks. Install the symlinks package if you need a program for maintaining symlinks on your system. 
SYnchronized MultiMedia working group (WAI) 
In encryption, the word symmetric means those cases where the same key both encrypts and decrypts. This has been historically the "normal" encryption, but new public-key cryptography is changing things. Analogy: In your house, the same keys are used to lock and unlock your door. Examples: Some symmetric encryption ciphers are: DES The forerunner to most of today's popular symmetric ciphers. RC2, RC4, and RC5 Popular ciphers by RSA used in today's browsers for secure connections to websites. IDEA A cipher made popular by the fact that it was used in PGP. Blowfish A well-regarded cipher with free source code, no license required, unpatented, and royalty-free. As such, it is an extremely popular symmetric encryption algorithm. TwoFish A new cipher with many of the same restrictions as Blowfish (i.e. none). It is even more efficient, and destined to become very popular. 
symmetric multi-processing (SMP)
Method of computing which uses two or more processors managed by one operating system, often sharing the same memory and having equal access to input/output devices. Application programs may run on any or all processors in a system. 
Modern mailing list manager Sympa is a scalable and highly customizable modern mailing list manager which can cope with big lists (200,000 subscribers). It can can handle a lots of useful features : - Moderation - Digest mode - Authentication (for subscription process) - Archive management - Multi-language support (us, fr, de, as, it, fi and Chinese locales) - Expiration process - Virtual domains (virtual robots) - Accesses to LDAP directories - Using a RDBMS for storing subscriber information (it supports both MySQL and PostgreSQL). - S/MIME encryption and HTTPS authentication Sympa provides a scripting language for extending the behaviour of commands, and a complete (user and admin) Web interface called WWSympa. SYMPA means 'Systhme de Multi-Postage Automatique' (French) or 'Automatic Mailing System' (English). It is written in Perl and uses some modules (mailtools, md5, msgcat, db). WWSympa is provided in a separate package named `wwsympa'. 
The first packet sent across a TCP connection is known as a "SYN" or "synchronize" packet. For example, when you contact, the first packet your systems out will be a SYN packet to the HTTP port 80 on Your browser is telling the web server that it wants to connect. Key point: Most packet-filtering firewalls work by blocking the SYN packets. This stops connections from being initiated. You can still scan behind these firewalls using ACK or FIN packets, but you will not be able to connect to any of those machines. See also: SYN flood, three-way-handshake, TCP 
SYN flood
A SYN flood is a type of DoS attack. A SYN packet notifies a server of a new connection. The server then allocates some memory in order to handle the incoming connection, sends back an acknowledgement, then waits for the client to complete the connection and start sending data. By spoofing large numbers of SYN requests, an attacker can fill up memory on the server, which will sit their waiting for more data that never will arrive. Once memory has filled up, the server will be unable to accept connections from legitimate clients. This effectively disables the server. Key point: SYN floods exploit a flaw in the core of the TCP/IP technology itself. There is no complete defense against this attack. There are, however, partial defenses. Servers can be configured to reserve more memory and decrease the amount of time they wait for connections to complete. Likewise, routers and firewalls can filter out some of the spoofed SYN packets. Finally, there are techniques (such as "SYN cookies") that can play tricks with the protocol in order to help distinguish good SYNs from bad ones. 
A program for representing sounds visually This is a program for representing sounds visually (from a CD, line input, or through a pipe). It goes beyond the usual oscilloscope style program by combining a FFT and stereo positioning information to give a two dimensional display. X and svgalib versions are included in this package. 
GUI-frontend for APT Synaptic (previously known as raptor) is a graphical package management program for Debian. It provides the same features as the apt-get command line utility with a GUI front-end based on WINGs and can handle RPMs as well. 
/sink/ n., vi. (var. `synch') 1. To synchronize, to bring into synchronization. 2. [techspeak] To force all pending I/O to the disk; see flush, sense 2. 3. More generally, to force a number of competing processes or agents to a state that would be `safe' if the system were to crash; thus, to checkpoint (in the database-theory sense). 
commit buffer cache to disk. 
flush filesystem buffers 
To force all pending I/O to the disk. 
To force all pending input/output to the disk drive. 
BBDB to PalmOS Pilot Manger conduit Transfer address records between a PalmOS device like a Palm Pilot or a Visor, using a perl BBDB to PalmOS Pilot Manager conduit. 
SYStem ADministrator, "SysAd" 
/sis'ad-min/ n. Common contraction of `system admin'; see admin. 
The Linux System Administrators' Guide The Linux System Administrators' Guide from the Linux Documentation Project. Aimed at novice system administrators. This package presents the guide in HTML format, you can produce other formats by getting the source package. 
configure kernel parameters at runtime 
read/write system parameters 
SYStem EXecutive (OS, IBM, S/360) 
System Logging Daemon This package implements the system log daemon, which is an enhanced version of the standard Berkeley utility program. It is responsible for providing logging of messages received from programs and facilities on the local host as well as from remote hosts. 
The sysklogd package contains two system utilities (syslogd and klogd) which provide support for system logging. Syslogd and klogd run as daemons (background processes) and log system messages to different places, like sendmail logs, security logs, error logs, etc. 
bootloader for Linux using MS-DOS floppies 
Bootloader for Linux/i386 using MS-DOS floppies SYSLINUX is a boot loader for the Linux/i386 operating system which operates off an MS-DOS/Windows FAT filesystem. It is intended to simplify first-time installation of Linux, and for creation of rescue and other special-purpose boot disks. SYSLINUX is probably not suitable as a general purpose boot loader. However, SYSLINUX has shown itself to be quite useful in a number of special-purpose applications. You will need support for `msdos' filesystem in order to use this program 
SYSLINUX is a boot loader for the Linux operating system which canoperate off MS-DOS floppies. It is intended to simplify first-time installation of Linux, rescue disks, and provide other uses for boot floppies. A SYSLINUX floppy can be manipulated using standard MS-DOS(or any other OS that can access an MS-DOS filesystem) tools (once it has been created), and requires only an approximately 7K DOS program or approximately 13K Linux program to create it in the first place. It also includes PXELINUX, a program to boot off a network server using a boot PROM compatible with the Intel PXE (Pre-Execution Environment) specification. 
SYSLINUX is a boot loader for the Linux operating system which operates off an MS-DOS/Windows FAT filesystem. It is intended to simplify first-time installation of Linux, and for creation of rescue-and other special-purpose boot disks. This version include a patched SYSLINUX for handling VESA graphic mode. 
converts a syslinux-format screen to pc-ansi 
On UNIX, syslog is the standard logging facility. Programs call the syslog() function, and their messages end up somewhere in the /var/log directory. The syslog facility can also be configured to forward alerts from one UNIX machine to another (using un-authenticated UDP datagrams to port 514). Key point: When analyzing a machine that was broken into, you may find interesting information in the syslog logs. In particular, buffer-overflow attempts have distinctive messages, such as messages claiming an unknown command where the command is a string of binary characters. 
The UNIX System Logger. 
The UNIX/Linux System Logger, where all system messages or errors are stored. 
Setup and remove LOCALx facility for sysklogd 
Next generation logging daemon Syslog-ng tries to fill the gaps original syslogd's were lacking: * powerful configurability * filtering based on message content * message integrity, message encryption (near future) * portability * better network forwarding 
Summarize the contents of a syslog log file. This program summarizes the contents of a log file written by syslog, by displaying each unique (except for the time) line once, and also the number of times such a line occurs in the input. The lines are displayed in the order they occur in the input. 
list system logfiles 
Modularized system wide shell logout mechanism Simple centralized configuration mechanism for flexible maintenance of the shell specific parts for logout from a Debian Linux system. It has been designed to work with bash. Other shells have not been taken in consideration for this version. 
display system news The news command keeps you informed of news concerning the system. Each news item is contained in a separate file in the /var/lib/sysnews directory. Anyone having write permission to this directory can create a news file. NOTE: This command has nothing to do with USENET news. It's more like an enhanced motd. 
/sis'op/ n. [esp. in the BBS world] The operator (and usually the owner) of a bulletin-board system. A common neophyte mistake on FidoNet is to address a message to `sysop' in an international echo, thus sending it to hundreds of sysops around the world. 
SYStem OPerator (BBS), "SysOp" 
Sysop (System Operator)
Anyone responsible for the physical operations of a computer system or network resource. For example, a System Administrator decides how often backups and maintenance should be performed and the System Operator performs those tasks. 
Modularized system wide shell configuration mechanism Simple centralized configuration mechanism for flexible maintenance of the shell specific parts for login to a Debian Linux system. It has been designed to work with bash. Other shells have not been taken in consideration for this version. 
sar, iostat and mpstat - system performance tools for Linux The sysstat package contains the sar, mpstat and iostat commands for Linux. The sar command collects and reports system activity information. The iostat command reports CPU utilization and I/O statistics for disks. The mpstat command reports global and per-processor statistics. The statistics reported by sar concern I/O transfer rates, paging activity, process-related activities, interrupts, network activity, memory and swap space utilization, CPU utilization, kernel activities and TTY statistics, among others. Both UP and SMP machines are fully supported. 
n. 1. The supervisor program or OS on a computer. 2. The entire computer system, including input/output devices, the supervisor program or OS, and possibly other software. 3. Any large-scale program. 4. Any method or algorithm. 5. `System hacker': one who hacks the system (in senses 1 and 2 only; for sense 3 one mentions the particular program: e.g., `LISP hacker') 
system call
The mechanism used by an application program to request service from the operating system. System calls often use a special machine code instruction which causes the processor to change mode (e.g. to "supervisor mode" or "protected mode"). 
The services provided by the kernel to application programs, and the way in which they are invoked. See section 2 of the manual pages.
System-Down::Rescue is a free downloadable live distribution. It is designed to recover damaged file-systems, copying the data around other physical discs or networks, or burning them on a CD-ROM, using cdrecord. It features a working hardware detection system. Initial version 1.0.0pre4 was released June 9, 2003. A 'special purpose/mini' distribution. 
Programs that implement high level functionality of an operating system, i.e., things that aren't directly dependent on the hardware. May sometimes require special privileges to run (e.g., for delivering electronic mail), but often just commonly thought of as part of the system (e.g., a compiler).
Unified Configuration API for Linux Installation Provides an API for various installation and configuration processes that are otherwise inconsistent between the many Linux distributions, and the many architectures they run on. For example, you can configure the bootloader on a system in a general way - you don't need to know anything about the particular boot loader on the system. You can update the network settings of a system, without knowing the distribution or the format of its network configuration files. 
SystemImager utilities for golden clients SystemImager is a set of utilities for installing GNU/Linux images to clients machines over the network. Images are stored in flat files on the server, making updates easy. rsync is used for transfers, making updates efficient. This package contains utilities for updating a client's image from the server, and preparing a client for having it's image fetched by the server. 
Kernel tuning through the /proc filesystem. This program writes kernel parameters, previously saved in a configuration file, to the /proc filesystem. This enables kernel performance to be adjusted without recompiling the kernel. systune can be alternative to sysctl(8). It is also started after the most daemons and other init.d scripts, so it can be used as "second stage" sysctl. 
Miscellaneous small system utilities. This is a package incorporating various small utilities which are: procinfo - Displays system information from /proc (v17), memtest - Test system memory for errors (v2.93.1), bogomips - Shows the current bogomips rating without rebooting (v1.2), tofromdos - Converts DOS <-> Unix text files (v1.4). 
System-V banner clone Displays a `banner' text the same way as the System V banner does: horizontally. 
System-V like init. Init is the first program to run after your system is booted, and continues to run as process number 1 until your system halts. Init's job is to start other programs that are essential to the operation of your system. All processes are descended from init. For more information, see the manual page init(8). 
The SysVinit package contains a group of processes that control the very basic functions of your system. SysVinit includes the init program, the first program started by the Linux kernel when the system boots. Init then controls the startup, running and shutdown of all other programs. 
/T/ 1. [from LISP terminology for `true'] Yes. Used in reply to a question (particularly one asked using The -P convention). In LISP, the constant T means `true', among other things. Some Lisp hackers use `T' and `NIL' instead of `Yes' and `No' almost reflexively. This sometimes causes misunderstandings. When a waiter or flight attendant asks whether a hacker wants coffee, he may absently respond `T', meaning that he wants coffee; but of course he will be brought a cup of tea instead. Fortunately, most hackers (particularly those who frequent Chinese restaurants) like tea at least as well as coffee -- so it is not that big a problem. 2. See time T (also since time T equals minus infinity). 3. [techspeak] In transaction-processing circles, an abbreviation for the noun `transaction'. 4. [Purdue] Alternate spelling of tee. 5. A dialect of LISP developed at Yale. (There is an intended allusion to NIL, "New Implementation of Lisp", another dialect of Lisp developed for the VAX) 
A leased-line connection capable of carrying data at 1,544,000 bits-per-second. At maximum theoretical capacity, a T-1 line could move a megabyte in less than 10 seconds. That is still not fast enough for full-screen, full-motion video, for which you need at least 10,000,000 bits-per-second. T-1 lines are commonly used to connect large LANs to the Internet. 
A leased-line connection capable of carrying data at 44,736,000 bits-per-second. This is more than enough to do full-screen, full-motion video. 
Yet another Japanese input method T-Code is Japanese input method that doesn't use Kana-to-Kanji conversion. You can input Kanji characters directly in the same way of inputting Hiragana. This packages also provides TUT-Code input method (the alternative of T-Code). 
A branch of Semi-gnus (Gnus for SEMI) variants. Semi-gnus is a replacement of Gnus with gnus-mime for SEMI. It has all features of Gnus and gnus-mime, so there are no need to install Gnus to use it, and you must not use gnus-mime for SEMI. It requires SEMI package, so please get and install SEMI package before to install it. Use T-gnus in offline(Unplugged) status using gnus-offline. T-gnus have also features that have Semi-gnus MainTrunk. Enable to get Multiple Pop server in POP and APOP using pop3-fma.el (pop3 For Multi Account). By Tatsuya Ichikawa <>. T-gnus is one of Semi-gnus variants. Now, "Semi-gnus" is generic name of Gnus for SEMI. 
display filter for RFC822 messages This program is a filter which shall improve the readability for messages (email and posts) by *hiding* some annoying parts, e.g. mailing list footers, signatures and TOFU as well as squeezing sequences of blank lines or punctuation. TOFU is an acronym that stands for "Text oben, Fullquote unten" (german language) which means the style of sadly so many people that just leave all the quotes in a reply and add some own lines above. This acronym is what gave the script it's name - TOFU Protection. It currently offers hints how to include it within mutt. It should be possible to do similars with other mailers that allow to have a message run through a program before it's displayed. If you have such an mailer I'd be interested if you could let me know of your setup. 
[digital] Transmission link 1 [1.544 Mbit/s] (DS1) 
Type 1 font rasterizer library - user binaries T1lib is an enhanced rasterizer for Type 1 fonts. T1lib is based on the X11R5 font rasterizer code, but operates independently of X11. It includes many enhancements, including underlining, antialiasing, user-defined slant and extension factors, and rotation. This package contains the programs "xglyph" and "type1afm", included in the upstream T1lib distribution. It also contains the "t1libconfig" script used to configure t1lib. 
T1lib is a library for generating character and string-glyphs from Adobe Type 1 fonts under UNIX. T1lib uses most of the code of the X11 rasterizer donated by IBM to the X11-project. But some disadvantages of the rasterizer being included in X11 have been eliminated. T1lib also includes a support for antialiasing. 
Type 1 font rasterizer library - runtime T1lib is an enhanced rasterizer for Type 1 fonts. T1lib is based on the X11R5 font rasterizer code, but operates independently of X11. It includes many enhancements, including underlining, antialiasing, user-defined slant and extension factors, and rotation. This package contains the shared libraries needed to run programs using T1lib. 
A tool to help xdvi use all your t1 fonts 
A collection of simple Type 1 font manipulation programs. t1utils is a collection of simple type-1 font manipulation programs. Together, they allow you to convert between PFA (ASCII) and PFB (binary) formats; disassemble PFA or PFB files into human-readable form; and reassemble the human-readable files into PFA or PFB format files. You can also extract font resources from a Macintosh font file (ATM/Laserwriter), or create a Macintosh Type 1 font file from a PFA or PFB font. There are currently six programs: t1ascii Converts PFB files to PFA format. t1binary Converts PFA files to PFB format. t1disasm Disassembles a Type 1 font (PFA or PFB format) into a raw, human-readable text form for subsequent hand editing, tweaking, hint fixing, etcetera... t1asm Assembles a Type 1 font into PFA or PFB format from the human-readable form produced by t1disasm. t1unmac Extracts POST resources from a Macintosh Type 1 font file (ATM/Laserwriter) into PFA or PFB format for use outside the Macintosh environment. The Macintosh file should be stored in MacBinary, AppleSingle, AppleDouble, or BinHex format, or as a raw resource fork. Note that t1unmac does not have to run on a Macintosh, but makes Macintosh Type 1 fonts available for use on Unix machines and PCs. t1mac Creates a Macintosh Type 1 file from a PFA- or PFB-format Type 1 font. Writes the Macintosh file in MacBinary, AppleSingle, AppleDouble, or BinHex format, or as a raw resource fork. WARNING: This tool will not suffice to allow you to use the new font on a Macintosh, as Macintoshes cannot read raw Type 1 fonts. You will need to create a font suitcase containing bitmap fonts. If you do not already have such a suitcase for the font, T1utils will not help you create one. This version of the t1utils programs has been maintained by Eddie Kohler <> since version 1.5, based on the original code by I. Lee Hetherington. As such, it is a complete replacement for the t1utils Debian package, which is based on version 1.2 of I. Lee Hetherington's code. 
The t1utils package is a set of programs for manipulating PostScript Type 1 fonts. It contains programs to change between binary PFB format (for storage), ASCII PFA format (for printing), a human-readable andeditable ASCII format, and Macintosh resource forks. 
[digital] Transmission link 2 [6.312 Mbps] (DS2) 
[digital] Transmission link 3 [44.736 Mbps] (DS3) 
[digital] Transmission link 4 [274.176 Mbps] (DS4) 
Terminal Adapter (ISDN) 
TA-Linux is a small, multiplatform Linux distribution. It comes with just enough to be usable and it's easy to customize to some particular use. TA-Linux sparc pre-0.2.0-test was released June 6, 2002. A major rewrite of TA-Linux, version 0.2.0-Preview1, was released July 6, 2002. TA-Linux 0.2.0-Beta1 (Alpha) was released August 15, 2002. TA-Linux 0.2.0-Beta2 (i386) was released August 22, 2002. Version 0.2.0-beta4 (i386) was released June 10, 2003. A small disk distribution. 
Taiwanese Association for Artificial Intelligence (org., Taiwan, AI) 
An object that divides separate but related functions in a graphical application. 
concatenate and print files in reverse 
Technical Assistance Center (Cisco) 
Terminal Access Circuit 
Terminal Access Controller (ARPANET, MILNET) 
Type Approval Code (IMEI, GSM, mobile-systems) 
This is the daemon for the TACACS+ protocol TACACS or XTACACS protocol is diferent from TACACS+ protocol. be careful, may not be secure. This package is for manage a cisco RAS or other RAS that supports the TACACS+ protocol. A RAS is a remote access server. Mostly they are black boxes that let users connect to internet using PPP, SLIP or other protocol... On doubt, don't install. 
Terminal Access Controller Access Control System (RFC 1492) 
terminfo action checker 
Total Access Communication Service (mobile-systems) 
Thai API Consortium / Thai Industrial Standard [codeset] (API, TIS) 
Time Assigned Data Interpolation 
TActical Digital Information Link (mil.) 
Test and Debug System 
Telekommunikations-AnschlussEinheit (Telekom) 
Terminal Access Facility 
Technical Architecture Framework for Information Management (JIEO, mil.) 
A command in a markup language, such as HTML, to display information in a certain way, such as bold, centered or using a certain font. 
In HyperText Markup Language (HTML), a code that identifies an element (a certain pan of a document, such as a heading or list) so that a Web browser can tell how to display it. Tags are enclosed by beginning and ending delimiters (angle brackets). Most tags begin with a start tag (delimited with <>), followed by the content and an end tag (delimited with </>), as in the following example: <H1>Welcome to my home page</H1> 
Technical Advisory Group (PIMA, I3C) 
Utilities for handling 'tagged' files Set of utilities for manipulating files in a specific tagged format, similar to that of lsm files (but with slightly different rules for handling multi line fields). They are intended for use as an interchange format and are described on the Tag Types Homepage at 
Personal time management system Taglog is designed for anyone who spends most of their day sitting at a computer, working on various projects. You can make notes about what you do, as you go along, associating them with the projects you work on. At the end of the week you can produce a report of how your time was spent, broken down by project for booking purposes. You can view previous entries, by date, or by project. You can enter the actions you intend to take, associate them with a project, and mark them as active, or complete. 
output the last part of files 
A common vulnerability that hackers use to break into systems is the lack of proper input validation. The problem is that programmers expect users to enter in "proper" input, but fail to check for the case of hostile users carefully crafting input designed to compromise the system. The problems with input validation is that the part of the system that receives the input does not know enough to validate it properly. On the other hand, every single component in the system cannot thoroughly validate input. The concept of "taint" is to mark certain inputs as having been entered by the user. Only a thorough desconstruction/reconstruction of the data removes the taint. Some programming languages, like PERL, automate this tracking. Others, like C, requires manual tracking. Example: Version 4 of PERL has a special alternative interpretter called tainperl that tracks tainted input. Version 5 of PERL has the option "-T" that tracks taint. See also: metacharacter 
Technisch-Administratives InformationsSystem 
Toshiba America Information Systems [inc] (manufacturer, USA, Toshiba) 
TALigent Application Program (Taligent), "TalAE" 
TALigent Development Environment (Taligent), "TalDE" 
Tracing Authors' rights by Labelling Image Services and Monitoring Access Network [project] (Europe) 
Talk to another user. Talk is a visual communication program which copies lines from your terminal to that of another user. In order to talk locally, you will need to install the talkd package. 
The talk package provides client and daemon programs for the Internet talk protocol, which allows you to chat with other users on different systems. Talk is a communication program which copies lines from one terminal to the terminal of another user. 
talk mode
n. A feature supported by Unix, ITS, and some other OSes that allows two or more logged-in users to set up a real-time on-line conversation. It combines the immediacy of talking with all the precision (and verbosity) that written language entails. It is difficult to communicate inflection, though conventions have arisen for some of these (see the section on writing style in the Prependices for details). Talk mode has a special set of jargon words, used to save typing, which are not used orally. Some of these are identical to (and probably derived from) Morse-code jargon used by ham-radio amateurs since the 1920s. AFAIAC as far as I am concerned AFAIK as far as I know BCNU be seeing you BTW by the way BYE? are you ready to unlink? (this is the standard way to end a talk-mode conversation; the other person types BYE to confirm, or else continues the conversation) CUL see you later ENQ? are you busy? (expects ACK or NAK in return) FOO? are you there? (often used on unexpected links, meaning also "Sorry if I butted in ..." (linker) or "What's up?" (linkee)) FWIW for what it's worth FYI for your information FYA for your amusement GA go ahead (used when two people have tried to type simultaneously; this cedes the right to type to the other) GRMBL grumble (expresses disquiet or disagreement) HELLOP hello? (an instance of the `-P' convention) IIRC if I recall correctly JAM just a minute (equivalent to SEC....) MIN same as JAM NIL no (see NIL) NP no problem O over to you OO over and out / another form of "over to you" (from x/y as "x over y") \ lambda (used in discussing LISPy things) OBTW oh, by the way OTOH on the other hand R U THERE? are you there? SEC wait a second (sometimes written SEC...) SYN Are you busy? (expects ACK, SYN|ACK, or RST in return; this is modeled on the TCP/IP handshake sequence) T yes (see the main entry for T) TNX thanks TNX 1.0E6 thanks a million (humorous) TNXE6 another form of "thanks a million" WRT with regard to, or with respect to. WTF the universal interrogative particle; WTF knows what it means? WTH what the hell? <double newline> When the typing party has finished, he/she types two newlines to signal that he/she is done; this leaves a blank line between `speeches' in the conversation, making it easier to reread the preceding text. <name>: When three or more terminals are linked, it is conventional for each typist to prepend his/her login name or handle and a colon (or a hyphen) to each line to indicate who is typing (some conferencing facilities do this automatically). The login name is often shortened to a unique prefix (possibly a single letter) during a very long conversation. /\/\/\ A giggle or chuckle. On a MUD, this usually means `earthquake fault'. Most of the above sub-jargon is used at both Stanford and MIT. Several of these expressions are also common in email, esp. FYI, FYA, BTW, BCNU, WTF, and CUL. A few other abbreviations have been reported from commercial networks, such as GEnie and CompuServe, where on-line `live' chat including more than two people is common and usually involves a more `social' context, notably the following: <g> grin <gd&r> grinning, ducking, and running BBL be back later BRB be right back HHOJ ha ha only joking HHOK ha ha only kidding HHOS ha ha only serious IMHO in my humble opinion (see IMHO) LOL laughing out loud NHOH Never Heard of Him/Her (often used in initgame) ROTF rolling on the floor ROTFL rolling on the floor laughing AFK away from keyboard b4 before CU l8tr see you later MORF male or female? TTFN ta-ta for now TTYL talk to you later OIC oh, I see rehi hello again Most of these are not used at universities or in the Unix world, though ROTF and TTFN have gained some currency there and IMHO is common; conversely, most of the people who know these are unfamiliar with FOO?, BCNU, HELLOP, NIL, and T. The MUD community uses a mixture of Usenet/Internet emoticons, a few of the more natural of the old-style talk-mode abbrevs, and some of the `social' list above; specifically, MUD respondents report use of BBL, BRB, LOL, b4, BTW, WTF, TTFN, and WTH. The use of `rehi' is also common; in fact, mudders are fond of re- compounds and will frequently `rehug' or `rebonk' (see bonk/oif) people. The word `re' by itself is taken as `regreet'. In general, though, MUDders express a preference for typing things out in full rather than using abbreviations; this may be due to the relative youth of the MUD cultures, which tend to include many touch typists and to assume high-speed links. The following uses specific to MUDs are reported: CU l8er see you later (mutant of CU l8tr) FOAD f*** off and die (use of this is generally OTT) OTT over the top (excessive, uncalled for) ppl abbrev for "people" THX thanks (mutant of TNX; clearly this comes in batches of 1138 (the Lucasian K)). UOK? are you OK? Some B1FFisms (notably the variant spelling d00d) appear to be passing into wider use among some subgroups of MUDders. One final note on talk mode style: neophytes, when in talk mode, often seem to think they must produce letter-perfect prose because they are typing rather than speaking. This is not the best approach. It can be very frustrating to wait while your partner pauses to think of a word, or repeatedly makes the same spelling error and backs up to fix it. It is usually best just to leave typographical errors behind and plunge forward, unless severe confusion may result; in that case it is often fastest just to type "xxx" and start over from before the mistake. See also hakspek, emoticon. 
Remote user communication server. Talkd is the server that notifies a user that someone else wants to initiate a conversation. It acts a repository of invitations, responding to requests by clients wishing to rendezvous to hold a conversation. 
TALigent Object Services (Taligent), "TalOS" 
Net Tamagotchi server Net Tamagotchi server - maintains multiple virtual pets on a Unix host to be accessed through telnet. 
Table / Total Area Network 
TransAction Number (banking) 
translate WEB to Pascal 
There Ain't No Justice (slang, Usenet, IRC) 
There Ain't No Such Thing As A Free Lunch (slang, Usenet) 
Track At Once (CD-R) 
Telocator Alphanumeric input Protocol (SNPP, PCIA, SMS, USA) 
Terminal Access Point (cable) 
Test Access Port (IC, IEEE 1149.1) 
The Ada Project 
Transport und Archivierung Produktdefinierender daten (org., DIN, STEP, CIM) 
Full-screen system backup utility. Taper is a tape backup and restore program that provides a friendly user interface to allow backup/restore to a tape drive. Alternatively, files can be backed up to hard disk files. Selecting files for backup and restore is very similar to the Mouseless Commander interface and allows easy traversal of directories. Recursively selected directories are supported. Incremental backup and automatic most recent restore are defaults settings. SCSI, ftape, zftape, ide tape drives, and removable drives are supported. 
Telephony Application Program Interface (Intel, MS, WOSA, CTI) 
A tool for real time audio delay and feedback effects. Tapiir is a simple and flexible audio effects processor, inspired on the classical magnetic tape delay systems used since the early days of electro-acoustic music composition. It provides a graphical user interface consisting of six delay lines, or "taps", which can introduce an almost arbitrarily big or small delay to their inputs and can be feed back to each other. A wide set of effects can be easily achieved by properly configuring and connecting the delay lines: complex echo patterns, resonances, filtering, etc. Delays, interconnections and gains can all be controlled in real time. Tapiir requires the ALSA sound driver. 
A program used to create a single file archive from several files, often used to distribute programs for Unix. The Unix command has many options. 
An archiver that is used to combine many files and directories in single archive file. The name comes from 'Tape ARchive', since the utility was created to make tape backups of Unix systems. 
GNU tar Tar is a program for packaging a set of files as a single archive in tar format. The function it performs is conceptually similar to cpio, and to things like pkzip in the DOS world. It is heavily used by the Debian package management system, and is useful for performing system backups and exchanging sets of files with others. 
Tape ARchiver (Unix) 
The GNU tar program saves many files together into one archive and can restore individual files (or all of the files) from the archive. Tar can also be used to add supplemental files to an archive and to update or list files in the archive. Tar includes multivolume support, automatic archive compression/decompression, the ability to perform remote archives and the ability to perform incremental and full backups. If you want to use Tar for remote backups, you'll also need to install the rmt package. You should install the tar package, because you'll find its compression and decompression utilities essential for working with files. 
Tar (Tape ARchive)
A file packaging tool included with UNIX/Linux for the purpose of assembling a collection of files into one combined file for easier archiving. It was originally designed for tape backup, but today can be used with other storage media. When run by itself, it produces files with a .tar extension. When combined with Gzip, for data compression, the resulting file extensions may be .tgz, .tar.gz or .tar.Z. 
tar and feather
vi. [from Unix tar(1)] To create a transportable archive from a group of files by first sticking them together with tar(1) (the Tape ARchiver) and then compressing the result (see compress). The latter action is dubbed `feathering' partly for euphony and (if only for contrived effect) by analogy to what you do with an airplane propeller to decrease wind resistance, or with an oar to reduce water resistance; smaller files, after all, slip through comm links more easily. Compare the more common tarball. 
A file created by the Tar utility, containing one or more other archived and, optionally, compressed files. 
A file created with the "tar" command containing a collection of other files. 
n. [very common; prob. based on the "tar baby" in the Uncle Remus folk tales] An archive, created with the Unix tar(1) utility, containing myriad related files. "Here, I'll just ftp you a tarball of the whole project." Tarballs have been the standard way to ship around source-code distributions since the mid-1980s; in retrospect it seems odd that this term did not enter common usage until the late 1990s. 
Tarball filter Tarcust is a tool designed to help developers rolling tarballs out of their programs. It acts as a filter on tar archives, any change on file attributes (like its name, uid, gid, etc) can be performed, and files can be removed but not added to archive. 
Tag Abuse Syndrome (SGML, HTML, slang) 
Time-Assigned Speech Interpolation 
a user interface for installing tasks 
Tool for selecting tasks for installation on Debian system This package provides 'tasksel', a simple interface for users who want to pick general tasks for installation on their Debian GNU/Linux system. This program is used during the installation process, but users can also use tasksel at any point. 
Turbo ASseMbler (Borland, assembler) 
Theoretical Arrival Time (GCRA) 
Tabular Bayes' [algorithm] 
Transparent Bridging 
Time Base Corrector (video) 
Tagged Binary Control Protocol (Adobe, PS) 
format tables for troff 
Technical Basis for Regulations (ISDN) 
Task Committee (IFIP) 
Technical Committee (ISO) 
Terminal Computer 
Terminal Controller 
Transaction Capabilities 
Transfer Control 
Transmission Control 
Transmission Convergence 
information technology & TeleCommunications Association (org.) 
Taipei Computer Association (org., Taiwan) 
Thin Client Application Framework (Java, LDAP, IBM) 
TeleCommunications Access Method (IBM, DFUe) 
Transaction Capabilities Applications Part (MSC, GSM, IN, mobile-systems) 
Task Control Block (BS2000) 
Telecommunications Center 
Transparent Computing Facility 
Transparent Cryptographic FileSystem (Linux, cryptography) 
Traffic CHannel (GSM, mobile-systems) 
Test Cell Input (UNI, ATM) 
Test ClocK (TAP, IC) 
Tcl is a simple scripting language designed to be embedded into other applications. Tcl is designed to be used with Tk, a widget set, which is provided in the tk package. This package also includes tclsh, a simple example of a Tcl application. If you're installing the tcl package and you want to use Tcl for development, you should also install the tk and tclx packages. 
Tool Command Language 
Tcl (generally pronounced "tickle") is a command language designed and first implemented by John Ousterhout. Tcl is an extensible, interpreted, programming language, which has been ported to a wide range of machines and operating systems. Tk (pronounced "Tee-kay") is an X-windows toolkit for Tcl. It is generally claimed that Tcl/Tk implementations of software require approximately 10 times less code than the corresponding software in C. 
Tcl is a scripting language. It is an easy to learn interpreted language that uses a typeless approach to achieve a higher level of programming and a rapid application development. The Tk toolkit is a programming environment for creating graphical user interf aces (GUI) under X Window System. Their capabilities include the possibility to extend and embed in other application, rapid development and ease of use. Toge ther, Tcl and Tk provide many benefits both to application developer and user. Tk-ba sed interfaces tend to be much more customizable and dynamic than those built with one of the C or C++ based toolkits. Tk implements the Motif look and feel. A great number of interesting X applications are implemented entirely in Tk, with no new application-specific commands at all. From Tcl/Tk HOWTO
Tcl interface to libcurl This module provides the same functionality as libcurl provides to C/C++ programs, please refer to the documentation of libcurl. 
A lexical analyzer generator for Tcl tcLex is a lexer (lexical analyzer) generator extension to Tcl. It is inspired by Unix and GNU lex and flex, which are "tools for generating programs that perform pattern-matching on text". tcLex is very similar to these programs, except it uses Tcl philosophy and syntax, whereas the others use their own syntax and are used in conjunction with the C language. People used to lex or flex should then feel familiar with tcLex. tcLex is a small extension (the Windows compiled version is about 20kb, and the source is about 150kb), because it extensively uses the Tcl library. However, the current doesn't use Tcl's regexp code anymore but a patched version is now included in tcLex, which makes it slightly bigger (by a few KB). tcLex should work with Tcl 8.0 and later. tcLex will NEVER work with earlier versions, because it uses Tcl 8.0's "object" system for performance. The most interesting features are: * cross-platform support, thanks to Tcl. Though it has been developed on Windows and tested on Windows and Unix only, it should work on other platforms as long as Tcl exists on these platforms. Supported Tcl platforms are Windows 95/NT, Unix (Linux, Solaris...) and Macintosh. Other platforms are VMS, OS/2, NeXTStep, Amiga... * unlike lex and flex, which only generate static lexers written in C and intended to be compiled, tcLex dynamically generates Tcl commands that can be used like other C commands or Tcl procedures from within Tcl scripts or C programs. * it uses Tcl regular expressions. That means you don't have to learn another regexp language. * it works with Tcl namespaces * the generated lexer commands can be used in one pass or incrementally, because they maintain state information. That way, several instances of the same lexer (eg a HTML parser) can run at the same time in distinct call frames and maintain distinct states (local variables...). Lexer need not be specially designed in order to be used incrementally, the same lexer can transparently be used in one pass or incrementally. This feature is especially useful when processing text from a file or an Internet socket (Web pages for example), when data is not necessarily available at the beginning of the processing. 
Tcl interface to expat XML parser. This package provides a Tcl interface to James Clark's expat library. It creates a Tcl package, called "expat", which defines a single new Tcl command "expat". 
The Standard Tcl Library Tcllib, the standard Tcl library, is a collection of common utility functions and modules. MODULES INCLUDED: * base64: a base64 encoder and decoder * calendar: routines for manipulating dates * cmdline: a command line argument processor similar to opt * comm: remote communications facility * control: procedures for control flow structures * counter: provides a counter facility and can compute statistics and histograms over the collected data. * crc: checksum-calculation routines (crc32, cksum, sum) * csv: functions to handle CSV (comma-separated values) data * doctools: manpage-generation tools * fileutil: Tcl implementations of some standard Unix utilities * ftp: Tcl interface to the FTP protocol * ftpd: implementation of functions needed for an FTP server * html: generate and control HTML tags * htmlparse: parse HTML strings * javascript: Tcl shortcuts to create common javascript functions * log: functions to log messages with various facilities and levels * math: common math functions like min, max, and others * md5: md5 hashing functions * mime: a MIME encoder and decoder * ncgi: a new CGI processing module * nntp: Tcl functions for the NNTP protocol * pop3: a POP3 protocol implementation * profiler: a function level Tcl source code profiler * report: provides objects which can be used to generate and format reports * sha1: sha1 hashing functions * smtpd: implemetnation of functions needed for an SMTP server * stats: functions for counters, histograms, and statistics * stooop: simple Tcl-only object oriented programming scheme - provides C++/Java-like OOP interfaces * struct: Tcl implementations of common data structures (tree, graph, etc) * textutil: string manipulation library * uri: functions to generate and manipulate commonly-used URIs 
GNU Readline Extension for Tcl/Tk. tclreadline adds GNU Readline support to standard Tcl/Tk shells. 
Simple shell containing Tcl interpreter 
Simple shell containing Tcl interpreter 
Tool Command Language/ToolKit (TCL, X-Windows), "TCL/TK" 
Extended Tcl (TclX) version 8.0.4 -- runtime package TclX is a set of extensions to Tcl. Extended Tcl is oriented towards Unix system programming tasks and large application development. Many additional interfaces to the Unix operating system are provided. It is upwardly compatible with Tcl. 
Extended Tcl (TclX) version 8.2.0 -- TclX runtime package Extended Tcl (TclX), is a set of extensions to Tcl, the Tool Command Language invented by Dr. John Ousterhout. Tcl is a powerful, yet simple embeddable programming language. Extended Tcl is oriented towards system programming tasks and large application development. TclX provides additional interfaces to the operating system, and adds many new programming constructs, text manipulation tools, and debugging tools. The tclx8.2 package doesn't include programs and libraries depending on Tk. You need the tkx8.2 package for these. 
Extended Tcl (TclX) version 8.3.0 -- TclX runtime package Extended Tcl (TclX), is a set of extensions to Tcl, the Tool Command Language invented by Dr. John Ousterhout. Tcl is a powerful, yet simple embeddable programming language. Extended Tcl is oriented towards system programming tasks and large application development. TclX provides additional interfaces to the operating system, and adds many new programming constructs, text manipulation tools, and debugging tools. The tclx8.3 package doesn't include programs and libraries depending on Tk. You need the tkx8.3 package for these. 
Thermal Conduction Module 
Time Compression Multiplexer 
Trellis Coded Modulation 
Thomas Conrad Network System (LAN) 
Test Cell Output (UNI, ATM) 
Tjaenstemaennens CentralOrganisation (Sweden, org.) 
Total Cost of Ownership 
see transmission control protocol (TCP). 
Tape Carrier Package (CPU) 
Test Coordination Procedure 
Transmission Control Protocol (ARPANET) 
Transmission Control Protocol--the big kahoona of the Internet Protocols. TCP takes the information to be generated by an application and passes it to the IP (Internet Protocol) to be transmitted. IP is responsible for getting a packet of information from one host to another, while TCP is responsible for making sure messages get from one host to another and that the messages are understood. From Glossary of Distance Education and Internet Terminology
Transmission Control Protocol. The chief transport protocol for TCP/IP. Key point: TCP is "connection oriented". This means the three-way handshake must be completed before any data can be sent across the connection. This makes IP address spoofing impossible without sequence number prediction. Key point: TCP creates a virtual "byte stream" for applications. Therefore, applications that send/receive data must create their own boundaries, such as length encoding the data, or send text data a line at a time. However, in practice, applications do indeed send data aligned on packet boundaries. Most network-based intrusion detection systems depend upon these boundaries in order to work correctly. Therefore, they can easily be evaded by custom written scripts that misalign the data. The applications don't see any difference, but the NIDS see something completely different go across the wire that no longer matches their signatures. Contrast: There are two transport protocols: TCP and UDP. Whereas TCP is connection-oriented, UDP is connectionless, meaning UDP-based applications are easily spoofed. TCP Format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Port | Destination Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Acknowledgment Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data | |U|A|P|R|S|F| | | Offset| Reserved |R|C|S|S|Y|I| Window | | | |G|K|H|T|N|N| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | Urgent Pointer | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | data | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Sequence Number^ The sequence number of the first byte within this packet. Acknowledgement Number^ The next expected sequence number of packets coming in the opposite direction. Reserved^ Not used. Note that this "field" is actually two fields: the low-order bits of the data offset byte and the high-order bits of the flags byte. Key point: The two undefined flags in this field are handled differently by different systems, which allows them to be fingerprinted URG^ The urgent flag is used to send what is known as out-of-band data. Key point: TCP/IP stacks often don't implement this right, and virtually no application uses it either. In fact, the WinNuke DoS attack against Windows was due to the fact that Windows would crash on URG data. ACK^ When set, the Acknowledgement Number field is valid. Key point: This bit is set in every packet but the first one, because every TCP packet acknowledges the last data it received. Key point: In order to block incoming connections, firewalls typically only pay attention to TCP packets with the ACK bit == 0. In other words, by blocking the first packet of a TCP connection, you prevent the connection from being established in the first place. Key point: Hackers can usually send TCP packets through a firewall by setting the ACK bit. Even though hackers cannot connect to a service, they can still do things like port scanning using this technique. PSH^ Normally, TCP tries to coalesce multiple packets into a single packet in order to improve throughput performance (handling one big chunk is more efficient than smaller chunks), but at the cost of latency (after receiving the first chunk, it must wait a little bit to see if a second chunk arrives). This bit tells the stack to push the data though immediately without waiting. RST^ Informs the other side that an error has occurred. This will either drop the connection or set it back to a known state. Key point: Different TCP/IP stacks send resets in response to different conditions, which can be used to fingerprint the stack. SYN^ Begins a connection. The most important consideration is synchronizing the sequence numbers on both sides. See SYN for more information. FIN^ Closes a connection. Key point: If you send a FIN packet to an open port, it should not respond. Some incorrectly written stacks respond anyway, allowing you to fingerprint a system. Key point: IDS systems monitoring network traffic will sometimes kill TCP sessions by spoofing a FIN packet. Thus, when it detects an intruder connected to a server, it will make the server think the intruder has hung-up, and the server will likewise hang-up. 
TCP sequence number prediction
When trying to spoof a TCP connection, the intruder is faced with the difficulty that he will never see the response to a SYN packet.. This is a problem because the victim sends back information to the spoofed address that is needed to carry on the conversation, namely the sequence number being used by the victim. Luckily (for hackers), most systems choose sequence numbers in a predictable way. History: Kevin Mitnick was caught doing TCP sequence number prediction against Tsutmu Shimomura. The reason Shimomura was able to catch Mitnick is because in order to predict the next sequence number, you must first grab the previous number using a non-spoofed connection. History: One of the first to point out this security problem was Robert T. Morris in a 1985 paper entitled A Weakness in the 4.2BSD Unix TCP/IP Software. 
TCP Transmission Control Protocol
(often written as TCP/IP because it works together with IP). TCP is a protocol which ensures that data transmitted is received in the intended order and free of errors. The reason for this is that when computer data is transmitted over the Internet it is broken up into small `packets' which may travel over different routes. 
Transmission Control Protocol/Internet Protocol. It is the data communication protocol most often used on Linux machines. [Transmission Control Protocol/Internet Protocol] The wide-area-networking protocol that makes the Internet work, and the only one most hackers can speak the name of without laughing or retching. Unlike such allegedly `standard' competitors such as X.25, DECnet, and the ISO 7-layer stack, TCP/IP evolved primarily by actually being used, rather than being handed down from on high by a vendor or a heavily-politicized standards committee. 
Transmission Control Protocol/Internet Protocol. It is the data communication protocol most often used on Unix machines. 
Almost all of the services provided through inetd are invoked through tcp-wrappers by way of the tcp-wrappers daemon, tcpd. The tcp-wrappers mechanism provides access control list restrictions and logging for all service requests to the service it wraps. It may be used for either TCP or TCP services as long as the services are invoked through a central daemon process such as inetd. These programs log the client host name of incoming telnet, ftp, rsh, rlogin, finger etc.... requests. Security options are access control per host, domain and/or service; detection of host name spoofing or host address spoofing; booby traps to implement an early-warning system. From Linux System Security
/T'C-P I'P/ n. 1. [Transmission Control Protocol/Internet Protocol] The wide-area-networking protocol that makes the Internet work, and the only one most hackers can speak the name of without laughing or retching. Unlike such allegedly `standard' competitors such as X.25, DECnet, and the ISO 7-layer stack, TCP/IP evolved primarily by actually being used, rather than being handed down from on high by a vendor or a heavily-politicized standards committee. Consequently, it (a) works, (b) actually promotes cheap cross-platform connectivity, and (c) annoys the hell out of corporate and governmental empire-builders everywhere. Hackers value all three of these properties. See creationism. 2. [Amateur Packet Radio] Formerly expanded as "The Crap Phil Is Pushing". The reference is to Phil Karn, KA9Q, and the context was an ongoing technical/political war between the majority of sites still running AX.25 and the TCP/IP relays. TCP/IP won. 
see transmission control protocol on top internet protocol (TCP/IP). 
TCP/IP (TCP/IP suite, TCP/IP stack)
Describes the protocols used on the Internet. The term evolved from the fact that these were the two most important protocols for engineers. If you talk about how to get data across the network from machine to machine, then you talk about IP packets. If you are interested in the abstract communication between applications, then you talk about TCP connections. If talk about generic transport of data encompassing both concepts (machine and application), then you naturally talk about both TCP and IP, or simply TCP/IP. 
TCP/IP (Transmission Control Protocol/Internet Protocol)
This is the suiteof protocols that defines the Internet. Originally designed for the UNIX operating system, TCP/IP software is now included with every major kind of computer operating system. To be truly on the Internet, your computer must have TCP/IP software. 
TCP Alternate Checksum Option (RFC 1146, TCP), "TCP-ACO" 
Transmission Control Protocol BIOS Extended User Interface (NETBIOS, TCP, UI) 
The Clean Personal Computer group (org., manufacturer, Grafikkarten) 
access control facility for internet services 
Wietse Venema's TCP wrapper utilities Wietse Venema's network logger, also known as TCPD or LOG_TCP. These programs log the client host name of incoming telnet, ftp, rsh, rlogin, finger etc. requests. Security options are: access control per host, domain and/or service; detection of host name spoofing or host address spoofing; booby traps to implement an early-warning system. 
tcp wrapper configuration checker 
tcp wrapper oracle 
A powerful tool for network monitoring and data acquisition This program allows you to dump the traffic on a network. tcpdump is able to examine IPv4, ICMPv4, IPv6, ICMPv6, UDP, TCP, SNMP, AFS BGP, RIP, PIM, DVMRP, IGMP, SMB, OSPF, NFS and many other packet types. It can be used to print out the headers of packets on a network interface, filter packets that match a certain expression. You can use this tool to track down network problems, to detect "ping attacks" or to monitor network activities. More information is at <URL:> 
Tcpdump is a command-line tool for monitoring network traffic. Tcpdump can capture and display the packet headers on a particular network interface or on all interfaces. Tcpdump can display all of the packet headers, or just the ones that match particular criteria. 
TCP flow recorder tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. A program like 'tcpdump' shows a summary of packets seen on the wire, but usually doesn't store the data that's actually being transmitted. In contrast, tcpflow reconstructs the actual data streams and stores each flow in a separate file for later analysis. tcpflow understands sequence numbers and will correctly reconstruct data streams regardless of retransmissions or out-of-order delivery. However, it currently does not understand IP fragments; flows containing IP fragments will not be recorded properly. tcpflow is based on the LBL Packet Capture Library and therefore supports the same rich filtering expressions that programs like 'tcpdump' support. tcpflow can also rebuild flows from data captured with 'tcpdump -w'. 
Transmission Control Protocol/Internet Protocol (RFC 793, IP), "TCP/IP" 
TCP extensions for Long Delay Paths (RFC 1072, TCP) 
A dialout/masquerading monitoring package. TCPQuota monitors and debit users depending on there online time (dialout). The program is made for those who have a local network with a server that also functions as a Internet gateway (among other things). The server runs diald, for example, which does the actual dial-on-demand, and this package which debit each user, whether from the server or from a masqueraded host (program includes masquerade code). All a user from inside the gateway/firewall have to do is run the command 'openhost', and the hostname and username is masqueraded and debited according to the time they spend calling out. 
Tool to replay saved tcpdump files at arbitrary speeds Tcpreplay is aimed at testing the performance of a NIDS by replaying real background network traffic in which to hide attacks. Tcpreplay allows you to control the speed at which the traffic is replayed, and can replay arbitrary tcpdump traces. Unlike programmatically-generated artificial traffic which doesn't exercise the application/protocol inspection that a NIDS performs, and doesn't reproduce the real-world anomalies that appear on production networks (asymmetric routes, traffic bursts/lulls, fragmentation, retransmissions, etc.), tcpreplay allows for exact replication of real traffic seen on real networks. 
extract pieces of and/or glue together tcpdump files Tcpslice is a program for extracting portions of packet-trace files generated using tcpdump(l)'s -w flag. It can also be used to glue together several such files. 
Incoming and Outgoing TCP/IP connections logger. tcpspy is an administrator's tool that logs information about incoming and outgoing TCP/IP connections. It's written in C and uses no libpcap functions, unlike tcpdump. Connections are selected for logging with rules, similarly to the filter expressions accepted by tcpdump. The following information is logged: username, local address and port, remote address and port, and, optionally, the executable filename. At present, only the IPv4 protocol is supported. 
network interface statistics reporting tool tcpstat reports certain network interface statistics much like vmstat does for system statistics. tcpstat gets its information by either monitoring a specific interface, or by reading previously saved tcpdump data from a file. 
A traceroute implementation using TCP packets The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets are taking to reach the destination. The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that traceroute(8) sends out end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters. 
Utilities for TCP programming in shell-scripts This is a collection of programs to facilitate TCP programming in shell-scripts. There is also a small library which makes it somewhat easier to create TCP/IP sockets. The programs included in this release are: mini-inetd - small TCP/IP connection dispatcher tcpbug - TCP/IP connection bugging device tcpconnect - general TCP/IP client tcplisten - general TCP/IP server getpeername - get name of connected TCP/IP peer 
acts as an intermediary between inetd and the server program to be run, providing a filtering "wrapper" that allows connections to be allowed or denied based on the host or network address. 
The tcp_wrappers package provides small daemon programs that canmonitor and filter incoming requests for systat, finger, FTP, telnet, rlogin, rsh, exec, tftp, talk, and other network services. Install the tcp_wrappers program if you need a security tool for filtering incoming network services requests. 
Character set translator. tcs translates character sets from one encoding to another. Supported encodings include utf (ISO utf-8), ascii, ISO 8859-[123456789], koi8, jis-kanji, ujis, ms-kanji, jis, gb, big5, unicode, tis, msdos, and atari. 
Transmission Convergence Sublayer (ATM) 
Trusted Computer System Evaluation Criteria (Orange Book, NCSC) 
TCSEC (DoD Trusted Computer System Evaluation Criteria, CSC-STD-001-83, DoD 5200.28-STD)
A formal and academic specification of infosec created by the United States Department of Defense in the early 1980s. Point: TCSEC is divided in four parts: A, B, C, and D, where 'A' describes systems with the highest security and 'D' describes untrusted/untrustworthy systems. Each of these is further subdivided into "classes". Microsoft received "C2" certification for Windows NT. This mean the government certified the system as to conforming to class 2 of division C. Contrast: TCSEC is designed around the concept of trusted employees accessing local systems. It was not designed for todays open Internet access. Hackers do not approach security from the TCSEC point of view. TCSEC doesn't deal with types of threats hackers pose. What this means is that the TCSEC approach is irrelevent when trying to defend your e-commerce site against hackers. However, it is extremely useful in protecting internal systems from internal people. Remember that the biggest threat is from your own internal employees, and that most cybercriminals were convicted for having abused trust placed in them. 
Tcsh is an enhanced but completely compatible version of csh, the Cshell. Tcsh is a command language interpreter which can be used both as an interactive login shell and as a shell script command processor. Tcsh includes a command line editor, programmable word completion, spelling correction, a history mechanism, job control, and a C language-like syntax. 
TENEX C Shell, an enhanced version of Berkeley csh. tcsh (TENEX C Shell) is an enhanced version of the Berkeley Unix C shell (csh(1)). It includes all the features of 4.4BSD C shell, plus a command-line editor, programmable word completion, spelling correction and more. 
Trustedi C SHell (Unix, Shell) 
Forensics related utilities. The Coroner's Toolkit (TCT) is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after a break-in. TCT enables you to collect date regarding deleted files, modification times of files and more. Tools contained within this package: grave-robber, lazarus, icat, ils, unrm and pcat. 
Tape Control Unit 
Timing Control Unit 
Transmission Control Unit 
Transmit Data (MODEM) 
TestDatenAuswerter (IC) 
Task DataBase 
Track Descriptor Block (UDF, CD-R) 
Trivial Database - bundled binaries This is a simple database API. It is modelled after the structure of GDBM. TDB features, unlike GDBM, multiple writers support with appropriate locking. This package contains bundled test and utility binaries 
Tape Data Controller 
Terrestrial Data Circuit 
Transportation Data Coordinating Committee (org., USA) 
Telecommunications Device for Deaf 
TeldeDienstDatenSchutzGesetz DFUe, IUKDG, Germany 
TeleDienstGesetz DFUe, IUKDG, Germany 
Test Data Input (TAP, IC) 
Trusted Database Interpretation (DB) 
Transfer Delay Jitter 
Todo list manager tdl is a lightweight program for managing a 'to-do' list of pending jobs that you have. 
Telekom Designed Networks (Telekom) 
Time Division Multiplexing 
Time Division Multiple Access (mobile-systems) 
Terminal Data Management System 
Telekom Designed Network 
Time Delay Neural Net (NN) 
Test Data Output (TAP, IC) 
Tape and Disk Operating System (OS, RCA Spectra 70) 
Telocator Data Protocol (PCIA, SMS, USA) 
Triton Data Path (Intel, Triton, IC) 
Time DOMAIN Reflectometer (cable) 
Tabular Data Strean [protocol] (Sybase) 
Telekom Digital Subscriber Line (Telekom, Germany), "T-DSL" 
Telekommunikation-DatenSchutzVerordnung (BMWI) 
Emacs major mode for editing SGML and XML DTDs Emacs lisp for editing DTDs. The mode, which will extend psgml mode, if available, contains functions for writing and editing element, attribute, internal parameter entities and external parameter entity declarations and comments to ease creating and keeping a consistent style. More advanced features include automatic XML detection, creation of Emacs TAGS file, minibuffer completion of elements and parameter entity names, and syntax highlighting. Author: Tony Graham <> Homepage: 
Telesoftware Data Unit (BTX) 
Terminal Equipment 
Telekommunikations-Anschluss-Einheit (Telekom) 
Taiwanese Electric Appliance Manufacturer's Association (org., Taiwan) 
Powerful and flexible RFC-compliant POP3 server Teapop is a POP-3 server (compliant with RFC1939 and RFC2449) which supports: * Virtual hosting ("VPOP") * Flexible authentication (can get username/password from mysql, PostgreSQL, .htpasswd files, system password db... LDAP coming RSN) * APOP * mbox and Maildir-style spools * Use of X-UIDL headers * Ignoring UW-IMAPD control mails * Running from inetd or standalone * Various possible POP-before-SMTP methods if you know what you're doing. The binary in this package does not include support for database authentication. Use the teapop-mysql or teapop-pgsql packages if you need database authentication. 
Powerful and flexible RFC-compliant POP3 server Teapop is a POP-3 server (compliant with RFC1939 and RFC2449) which supports: * Virtual hosting ("VPOP") * Flexible authentication (can get username/password from mysql, PostgreSQL, .htpasswd files, system password db... LDAP coming RSN) * APOP * mbox and Maildir-style spools * Use of X-UIDL headers * Ignoring UW-IMAPD control mails * Running from inetd or standalone * Various possible POP-before-SMTP methods if you know what you're doing. The binary in this package includes support for database authentication using mysql. Use the teapop package if you do not need database authentication at all, or the teapop-pgsql package if you need to use PostgreSQL database authentication. 
Powerful and flexible RFC-compliant POP3 server Teapop is a POP-3 server (compliant with RFC1939 and RFC2449) which supports: * Virtual hosting ("VPOP") * Flexible authentication (can get username/password from mysql, PostgreSQL, .htpasswd files, system password db... LDAP coming RSN) * APOP * mbox and Maildir-style spools * Use of X-UIDL headers * Ignoring UW-IMAPD control mails * Running from inetd or standalone * Various possible POP-before-SMTP methods if you know what you're doing. The binary in this package includes support for database authentication using PostgreSQL. Use the teapop package if you do not need database authentication at all, or the teapop-mysql package if you need to use mysql database authentication. 
Text Encoding Converter (Apple) 
Tech Ltda Computer science launched TechLinux 2.0 on July 16, 2001. This general purpose Linux OS is entirely in Brazilian Portuguese. 
Tape / Text Editor and COrrector (MIT) 
Graphical RTF (Rich Text Format) editor, lesstif version An editor designed for compatibility with popular MS-Windows applications that use the .rtf format, such as Word and Wordpad. Files created by Ted should be accepted as legal .rtf files. Compatibility the other way is more difficult to achieve, but Ted will ignore unsupported formatting. Ted supports font properties such as bold, italic and underline, in-line bitmap pictures, postscript printing, tables, and symbols. It can save documents in HTML format, and comes with built-in spell checking. Ted acts as a MIME handler for the application/rtf MIME type. This version of ted depends on the lesstif libraries. 
common files used by ted and ted-gtk Docs and such for the Graphical RTF editor, ted. 
TExt DAta eXchange [protocol] (MacOS) 
cuddly teddy bear for your X Windows desktop. 
Trade Electronic Data Interchange Systems (EDI, Europe) 
n.,vt. [Purdue] A carbon copy of an electronic transmission. "Oh, you're sending him the bits to that? Slap on a tee for me." From the Unix command tee(1), itself named after a pipe fitting (see plumbing). Can also mean `save one for me', as in "Tee a slice for me!" Also spelled `T'. 
read from standard input and write to standard output and files 
Turn based strategy game. Tenis Empanadas Graciela is a clone of Plan Tactico y Estratigico de la Guerra, based on Risk. Teg is a multiplayer game (it can be played across the internet) and it comes with a server, a GNOME client and a robot. It has support for GGZ Gaming Zone and IPv6. 
Text Encoding Initiative [application] (SGML) 
Napster client based on BitchX This package lets avid Napster users remain comfortably ensconced in the BitchX interface we all know and love. 
interactive tensor language Tela (pronounced teh-lah) is an interactive numerical computing package primarily targeted for prototyping numerical simulations. It is, however, also a general purpose programming language similar to C but with features derived from Pascal as well as other interactive systems such as Matlab. Tela is not a Matlab clone. Many of Tela's features are more powerful than in Matlab; on the other hand Tela's linear algebra routines are not as sophisticated as those in Matlab. Web page: 
TELephony Application System (CTI, SNI) 
The science of information transport using wire, radio, optical, or electromagnetic channels to transmit receive signals for voice or data communications using electrical means. From Glossary of Distance Education and Internet Terminology
Interactive communication among people at two or more locations using telecommunications. From Glossary of Distance Education and Internet Terminology
A graphical teletext viewer TeleGNOME is a program to display teletext pages over the internet. As of this moment, the teletext feeds from the Netherlands, Hungary, Denmark, Finland, Turkey, Armenia, and the Czech Republic are known to work. The program is kept quite simple, but it is very useful, hopefully. Never load up that large slow web browser to view the teletext pages, just use this nifty little piece of software. 
teletype (TTY) display
A method of displaying characters on a monitor in which characters are generated and lent, one by one, to the video display; as the characters are received, the screen fills, line by line. When full, the screen scrolls up to accommodate the new lines of characters appearing at the bottom of the screen. Teletype display mode should be familiar to DOS users. DOS uses a teletype display for accepting commands and displaying messages. See character-mapped display. 
Telephony Value Added Services (WAP), "TeleVAS" 
process control initialization 
TEileLogistik-InformationsSystem (MBAG) 
/tel'net/ vt. (also commonly lowercased as `telnet') To communicate with another Internet host using the TELNET (RFC 854) protocol (usually using a program of the same name). TOPS-10 people used the word IMPCOM, since that was the program name for them. Sometimes abbreviated to TN /T-N/. "I usually TN over to SAIL just to read the AP News." 
A network protocol that provides a remote command-line shell. Telnet was created in the early 1970s, and is still widely used (as of early 2000). The most common uses of Telnet are to remotely login to UNIX systems. It is also widely used to obtain a command-prompt on network equipment such as routers and switches. Misconception: The word Telnet is the name of both the protocol as well as the client-program that uses the protocol. This client program is built into most systems. Using the Telnet program, you can open up a raw TCP connection to any port on the target computer in order to interact directly with text-based protocols. Thus, when we talk about telnetting to a certain port, we usually are talking about simply opening a raw connection. Indeed, we may be referring to a case where neither the Telnet program nor protocol are being used, such as using netcat to port 80. Example: Telnet to your local SMTP using a command that looks like telnet 25. The first parameter should be your own mail server, whereas the second parameter indicates which port to connect to (other than the default port 23). Now type in the text as you see it below:
An Internet protocol that enables Internet users to log on to another computer linked to the Internet, including those that cannot directly communicate with the internet's TCP/IP protocols. Telnet establishes a "plain vanilla" computer terminal called a network virtual terminal. This capability is frequently used to enable communications with bulletin boards systems (BBSs) and mainframe computers. For example, you will often see hyperlinks so Telnet sessions while browsing the World Wide Web (WWW) . If you click such a hyperlink, your browser starts a Telnet helper program, and you see a text-only command window. In this window, you type commands and see the remote system's responses. 
It allows users to access computers and their data at thousands of places around the world, most often at libraries, universities, and government agencies. From Glossary of Distance Education and Internet Terminology
Protocol for interactive terminal access to remote machines. Telnet communications are unencrypted and provide no security from network interception. 
TELephone NETwork (Unix, Internet, RFC 854) 
Telnet is a popular protocol for logging into remote systems over the Internet. The telnet package provides a command line telnet client. 
The command and program used to login from one Internet site to another. The telnet command/program gets you to the login: prompt of another host. 
The telnet client. The telnet command is used for interactive communication with another host using the TELNET protocol. 
This program enables connection to foreign or remote host computers, (usually mainframes) and provides access information on them. 
Telnet is a popular protocol for logging into remote systems over the Internet. The telnet package provides a command line telnet client. Install the telnet package if you want to telnet to remote machines. This version supports kerberos authentication. 
The telnet client with SSL encryption support. The telnet command is used for interactive communication with another host using the TELNET protocol. SSL telnet(d) replaces normal telnet(d) using SSL authentication and encryption. It interoperates with normal telnet(d) in both directions. It checks if the other side is also talking SSL, if not it falls back to normal telnet protocol. Advantages over normal telnet(d): Your passwords and the data you send will not go in cleartext over the line. Nobody can get it with tcpdump or similar tools. With SSLtelnet you can also connect to https-server like Just do 'telnet 443' 
user interface to the TELNET protocol 
The telnet server. The in.telnetd program is a server which supports the DARPA telnet interactive communication protocol. 
The telnet server with SSL encryption support. The in.telnetd program is a server which supports the DARPA telnet interactive communication protocol. SSL telnet(d) replaces normal telnet(d) using SSL authentication and encryption. It interoperates with normal telnet(d) in both directions. It checks if the other side is also talking SSL, if not it falls back to normal telnet protocol. Advantages over normal telnet(d): Your passwords and the data you send will not go in cleartext over the line. Nobody can get it with tcpdump or similar tools. With SSLtelnet you can also connect to https-server like Just do 'telnet 443' 
create a temporary file in a safe manner 
In a program, a document or worksheet that includes the text or formulas needed to create standardized documents. The template can be used to automate the creation of these documents in the future. 
A template system template-new is called new by upstream author. It is especially useful in conjunction with a simple text editor such as vi. The user maintains templates which may contain format strings. At run time, new replaces the format strings in a template with appropriate values to create a new file. This amounts to creation of new files from templates by issuing a command like: new file.C It comes with a large set of predefined templates. 
TransEuropean Networks (network) 
A C and C++ compiler and checker using TDF/ANDF. TenDRA is a free C/C++ compiler built around the TDF/ANDF format which provides strict conformance checks for a range of APIs. Among those currently supported are ANSI and ISO C, POSIX 1 & 2, System V, Unix95, XPG3 and XPG4. C++ support is extremely limited in this release. 
1000 gigabytes. 
teraflop club
/te'r*-flop kluhb/ n.
Trans-European Research and Education Networking Association (org., Netherlands, Europe) 
TERMinal CAPability (Unix) 
The termcap package provides the /etc/termcap file. /etc/termcap is a database which defines the capabilities of various terminals and terminal emulators. Certain programs use the /etc/termcap file to access various features of terminals (the bell, colors, and graphics, etc.). 
Compatibility package for old termcap-based programs. The termcap-compat package provides the and /etc/termcap files which are required to run non-Debian, binary-only termcap-based programs. Since libc6-based programs are hopefully "modern" enough to be linked with ncurses (or slang), this package only provides a libc5-based libtermcap library. You do not need to install this package to run Debian-packaged programs since Debian GNU/Linux uses terminfo and not termcap. You need this package if a program (that you cannot recompile) fails to run with the error message "...: can't load library ''" or complains about a missing /etc/termcap file. The termcap-compat package isn't meant to be used to compile programs therefore it doesn't provide all the necessary files for compilation. If you want to compile a program that claims to need termcap, why not try ncurses's termcap emulation instead? It's as simple as linking with ncurses instead of libtermcap (i.e. replace the '-ltermcap' with '-lncurses' in the makefile). Ncurses' termcap emulation routines translate terminfo entries to termcap entries on the fly, so you don't even need an /etc/termcap file. This package provides: shared library, version 2.0.8 termcap database, version 10.2.7 
A device that allows you to send commands to a computer somewhere else. At a minimum, this usually means a keyboard and a display screen and some simple circuitry. Usually you will use terminal software in a personal computer - the software pretends to be (emulates) a physical terminal and allows you to type commands to a computer somewhere else. 
Terminal emulation
The use of a communications progam to transform a computer into a terminal for the purpose of data communication. 
terminal emulator
program that allows a computer to act like a (particular brand of) terminal, e.g. a vt-100. The computer thus appears as a terminal to the host computer and accepts the same escape sequences for functions such as cursor positioning and clearing the screen. 
Terminal Server
A special purpose computer that has places to plug in many modemson one side, and a connection to a LAN or host machine onthe other side. Thus the terminal server does the work of answering thecalls and passes the connections on to the appropriate node. Mostterminal servers can provide PPP or SLIP services if connectedto the Internet. 
terminal window
Application screen for typing system commands. See shell prompt. 
TERMinal INFOrmation (Unix) 
terminal wrapper 
A height field manipulation program Allows you to create a fractal terrain (also called a height field) and transform it using a number of algorithms. It is meant to be a tool for those who want to generate digital terrain models for use in raytracing or other simulations. 
Technology Enabled Marketing 
The Exponential Security System (RFC 1824) 
check file types and compare values 
n. 1. Real users bashing on a prototype long enough to get thoroughly acquainted with it, with careful monitoring and followup of the results. 2. Some bored random user trying a couple of the simpler features with a developer looking over his or her shoulder, ready to pounce on mistakes. Judging by the quality of most software, the second definition is far more prevalent. See also demo. 
check an smb.conf configuration file for internal correctness 
check printer name for validity with smbd 
TeTeX is an implementation of TeX for Linux or UNIX systems. TeX takes a text file and a set of formatting commands as input and creates a typesetter-independent .dvi (DeVice Independent) file as output. Usually, TeX is used in conjunction with a higher level formatting package like LaTeX or PlainTeX, since TeX by itself is not very user-friendly.Install tetex if you want to use the TeX text formatting system. If you are installing tetex, you will also need to install tetex-afm (aPostScript(TM) font converter for TeX), tetex-dvilj (for converting.dvi files to HP PCL format for printing on HP and HP compatible printers), tetex-dvips (for converting .dvi files to PostScript format for printing on PostScript printers), tetex-latex (a higher level formatting package which provides an easier-to-use interface for TeX), and tetex-xdvi (for previewing .dvi files in X). Unless you are anexpert at using TeX, you should also install the tetex-doc package, which includes the documentation for TeX. 
Network traffic analyzer (console) Ethereal is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. A sniffer is a tool used to capture packets off the wire. Ethereal decodes numerous protocols (too many to list). This package provides the console version of ethereal, named "tethereal". 
ANSI drawing and viewing utility. tetradraw is an easy to use drawing utility that gives you an ease access to the high characters like smileys, card signs and the well known single and double frame line characters but much more. Also the changing of foreground and background colors is not hard to do. tetraview is the viewer for such produced images. 
/tekh/ n. An extremely powerful macro-based text formatter written by Donald E. Knuth, very popular in the computer-science community (it is good enough to have displaced Unix troff, the other favored formatter, even at many Unix installations). TeX fans insist on the correct (guttural) pronunciation, and the correct spelling (all caps, squished together, with the E depressed below the baseline; the mixed-case `TeX' is considered an acceptable kluge on ASCII-only devices). Fans like to proliferate names from the word `TeX' -- such as TeXnician (TeX user), TeXhacker (TeX programmer), TeXmaster (competent TeX programmer), TeXhax, and TeXnique. See also CrApTeX. Knuth began TeX because he had become annoyed at the declining quality of the typesetting in volumes I-III of his monumental "Art of Computer Programming" (see Knuth, also bible). In a manifestation of the typical hackish urge to solve the problem at hand once and for all, he began to design his own typesetting language. He thought he would finish it on his sabbatical in 1978; he was wrong by only about 8 years. The language was finally frozen around 1985, but volume IV of "The Art of Computer Programming" is not expected to appear until 2002. The impact and influence of TeX's design has been such that nobody minds this very much. Many grand hackish projects have started as a bit of toolsmithing on the way to something else; Knuth's diversion was simply on a grander scale than most. TeX has also been a noteworthy example of free, shared, but high-quality software. Knuth offers a monetary awards to anyone who found and reported bugs dating from before the 1989 code freeze; as the years wore on and the few remaining bugs were fixed (and new ones even harder to find), the bribe went up. Though well-written, TeX is so large (and so full of cutting edge technique) that it is said to have unearthed at least one bug in every Pascal system it has been compiled with. 
A popular macro-based text formatter. The basis for other such formatters, including LaTeX and teTeX. 
An extremely powerful macro-based text formatter written by Donald E. Knuth, very popular in the computer-science community (it is good enough to have displaced Unix troff, the other favored formatter, even at many Unix installations). 
text formatting and typesetting 
Chess fonts for TeX/LaTeX. Piet Tutelaers' chess fonts for TeX/LaTeX. The included style file allows one to typesets moves, games and diagrams. 
miscellaneous utilities using DVIlib This package contains several utilities useful for dealing with TeX DVI files. dvi2misc generates PostScript, PGM or images for EPSON ESC/Page and Ricoh RPDL printers from a TeX DVI. It can be used as an DVI driver for those printers. dvifontlist displays a list of fonts used in a DVI file, while dvispecials displays a list of 'special' commands in a DVI file. dvipages shows the number of pages in a DVI file. xgdvi, spawx11 and spawg has been separated since they depend on X and/or GTK+ libraries. This is a part of the TeX-Guy distribution. 
LaTeX and TeX for Hypertext (HTML) TeX4ht is a highly configurable TeX-based authoring system for producing hypertext. It interacts with TeX-based applications through style files and postprocessors, leaving the processing of the source files to the native TeX compiler. Consequently, TeX4ht can handle the features of TeX-based systems in general, and of LaTeX in particular. TeX4ht can be used both for authoring HTML using TeX/LaTeX input files, or for converting existing TeX input files (in any format) into HTML, with (usually) only minor modifications. You will need imagemagick suite of programs to convert from graphics in DVI files, as output by TeX (via postscript) to GIF, PNG or JPEG files. Alternatively, you could use ghostscript and programs from the netpbm package after adjusting TeX4ht's configuration. 
configures teTeX 
Utility to maintain TeX format files 
GUI for easier access of TeX package and program documentations texdoctk is a GUI for easier access of a large part of the vast amount of package and program documentations and tutorials for TeX and its different derivatives (mainly LaTeX). 
TEXture ELement 
ConTeXt and PDF auxiliary program and batch processor 
create ls-R databases 
print Texinfo documents 
Convert Texinfo files to HTML texi2html is a Perl script that converts Texinfo files to HTML. The program takes Texinfo files (not info ones) and produces a set of HTML files. The quality of the output is close to the printed output and is much better than an info->HTML gateway. Compared to the output of `makeinfo --html', texi2html's output is more customizable and (subjectively) produces better output by default. 
create a PDF file from a Texinfo file 
sort Texinfo index files 
Documentation system for on-line information and printed output Texinfo is a documentation system that uses a single source file to produce both on-line information and printed output. Using Texinfo, you can create a printed document with the normal features of a book, including chapters, sections, cross references, and indices. From the same Texinfo source file, you can create a menu-driven, on-line Info file with nodes, menus, cross references, and indices. 
Texinfo is a documentation system that can produce both online informationand printed output from a single source file. Normally, you'd have to write two separate documents: one for online help or other online information and the other for a typeset manual or other printed work. Using Texinfo, you only need to write one source document. Then when the work needs revision, you only have to revise one source document. The GNU Project uses the Texinfo file format for most of its documentation. Install texinfo if you want a documentation system for producing both online and print documentation from the same source file and/or if you are going to write documentation for the GNU Project. 
maintain symbolic links from format to engine 
WYSIWYG emacs-ish mathematical text editor, using tex fonts GNU TeXmacs is a free scientific text editor, which was both inspired by TeX and GNU Emacs. The editor allows you to write structured documents via a WYSIWYG (what-you-see-is-what-you-get) and user friendly interface. New styles may be created by the user. The program implements high-quality typesetting algorithms and TeX fonts, which help you to produce professionally looking documents. The high typesetting quality still goes through for automatically generated formulas, which makes TeXmacs suitable as an interface for computer algebra systems. TeXmacs also supports the Guile/Scheme extension language, so that you may customize the interface and write your own extensions to the editor. In the future, TeXmacs is planned to evolve towards a complete scientific office suite, with spreadsheet capacities, a technical drawing editor and a presentation mode. See the TeXmacs home page 
ConTeXt command and parameter reference 
n. 1. [techspeak] Executable code, esp. a `pure code' portion shared between multiple instances of a program running in a multitasking OS. Compare English. 2. Textual material in the mainstream sense; data in ordinary ASCII or EBCDIC representation (see flat-ASCII). "Those are text files; you can review them using the editor." These two contradictory senses confuse hackers, too. 
This word has multiple senses. Historically, it comes the standard English word meaning that main body of a printed or written work. For example, the text of a letter somebody sent you distinguishes the body of the letter from the envelope or the greeting. In cryptography, the word TEXT means anything you might want to encrypt, where the words plaintext indicates the message before you encrypt it and ciphertext indicates the message after you encrypt it. In other areas of computer science, there is text data and binary data. The phrase "text" generally means human readable data, such as English text, whereas the word binary indicates data that can only be read by the computer. Misunderstanding: We sometimes encrypt binary data, in which case the binary data forms that plain text of the message. Conversely, the body of a binary program that runs is often referred to as the TEXT of the program. In both these particular areas, the word "TEXT" is indicating the oppose meaning of the general usage. 
Text Editor
A program for editing text files. Similar to a word processor, but without most/all of the formatting functions (such as margins, italics, fonts, etc.). Often used for writing or editing scripts, programs and ASCII text files (such as README.1ST). 
text editor
An application for reading and editing plain text files. 
Text editor
In programming, a program designed for altering sequences of words and numbers, but without the features of a full-fledged word processing program. Text editors are used for writing source code as well as creating basic text documents. 
text field
Area in a program or application for typing a word or group of words. 
Text Formatter
A program that prepares a text document for printing, allowing the user to perform many layout functions, such as margins, headers, footers, indentation, pagination and justification. 
text mode installation
Keyboard-oriented installation of a program or operating system, normally non-graphical. 
text user interface (TUI)
A non-graphical interface for the interactive use of a computer system, usually utilizing only a keyboard for input. 
This package provides a text analysis system. Textchk is a text analysis system to check spelling and/or stylistic conventions. 
test your mousing skills on spinning text 
A set of GNU utilities for modifying the contents of files, including programs for splitting, joining, comparing, and modifying files. 
The GNU text file processing utilities. The utilities: cat cksum comm csplit cut expand fmt fold head join md5sum nl od paste pr ptx sort split sum tac tail tr tsort unexpand uniq wc. 
ConTeXt auxiliary program 
Tinyfugue MUD client for TinyMUDs, DikuMUDs, and LPMUDs TinyFugue (also known as "Fugue" or "TF") is a line-based client designed for connecting to MUD servers (note: LP, Diku, and other servers which use prompts require "/lp on"; see /help prompts). TinyFugue is larger than most MUD clients, but has many more features and is much more flexible. The goal is to provide the most functionality in a client that still maintains the user-friendliness of Tinytalk. 
Trace Flag (assembler) 
Task Force on Cluster Computing (IEEE, Org) 
Thin Film Electronics (manufacturer, Norway, Sweden) 
Terminal Facility Identifier (T-Online) 
Tera FLoating-point Operations Per Second (CPU) 
Trusted Facility Manual 
Arphic "AR PL KaitiM Big5" TrueType font TeX font metric data This package contains the Arphic "AR PL KaitiM Big5" Chinese TrueType font TeX font metric data (TFM) files, which may be used with the cjk-latex package for doing typesetting. The TFM files are generated from bkai00mp.ttf using Werner Lemberg's ttf2tfm. *.enc font encoding vector files generated by ttf2pt1 are also included. This is to help pdflatex directly embed the TrueType font into PDF files. "AR PL KaitiM Big5" is a high-quality Chinese TrueType font (bkai00mp.ttf) generously provided by Arphic Technology to the Free Software community under the "Arphic Public License". Author: Arphic Technology Co., Ltd. URL: 
Arphic "AR PL Mingti2L Big5" TrueType font TeX font metric data This package contains the Arphic "AR PL Mingti2L Big5" Chinese TrueType font TeX font metric data (TFM) files, which may be used with the cjk-latex package for doing typesetting. The TFM files are generated from bsmi00lp.ttf using Werner Lemberg's ttf2tfm. *.enc font encoding vector files generated by ttf2pt1 are also included. This is to help pdflatex directly embed the TrueType font into PDF files. "AR PL Mingti2L Big5" is a high-quality Chinese TrueType font (bsmi00lp.ttf) generously provided by Arphic Technology to the Free Software community under the "Arphic Public License". Author: Arphic Technology Co., Ltd. URL: 
Arphic "AR PL SungtiL GB" TrueType font TeX font metric data This package contains the Arphic "AR PL SungtiL GB" Chinese TrueType font TeX font metric data (TFM) files, which may be used with the cjk-latex package for doing typesetting. The TFM files are generated from gbsn00lp.ttf using Werner Lemberg's ttf2tfm. *.enc font encoding vector files generated by ttf2pt1 are also included. This is to help pdflatex directly embed the TrueType font into PDF files. "AR PL SungtiL GB" is a high-quality Chinese TrueType font (gbsn00lp.ttf) generously provided by Arphic Technology to the Free Software community under the "Arphic Public License". Author: Arphic Technology Co., Ltd. URL: 
Arphic "AR PL KaitiM GB" TrueType font TeX font metric data This package contains the Arphic "AR PL KaitiM GB" Chinese TrueType font TeX font metric data (TFM) files, which may be used with the cjk-latex package for doing typesetting. The TFM files are generated from gkai00mp.ttf using Werner Lemberg's ttf2tfm. *.enc font encoding vector files generated by ttf2pt1 are also included. This is to help pdflatex directly embed the TrueType font into PDF files. "AR PL KaitiM GB" is a high-quality Chinese TrueType font (gkai00mp.ttf) generously provided by Arphic Technology to the Free Software community under the "Arphic Public License". Author: Arphic Technology Co., Ltd. URL: 
Tops Filing Protocol 
Translucent File System 
Task File Table (BS2000) 
Thin Film Transistor (LCD) 
convert TeX font metric (tfm) files to property lists 
Trivial file transfer program. Tftp is the user interface to the Internet TFTP (Trivial File Transfer Protocol), which allows users to transfer files to and from a remote machine. The remote host may be specified on the command line, in which case tftp uses host as the default host for future transfers. 
Trivial File Transfer Protocol (UDP, RFC 1350/1782/1783/1784/1785) 
Trivial File Transfer Protocol TFTP is a bare-bones protocol used by devices that boot from the network. It is runs on top of UDP, so it doesn't require a real TCP/IP stack. Misunderstanding: Many people describe TFTP as simply a trivial version of FTP. This misses the point. The purpose of TFTP is not to reduce the complexity of file transfer, but to reduce the complexity of the underlying TCP/IP stack so that it can fit inside boot ROMs. Key point: TFTP is almost always used with BOOTP. BOOTP first configures the device, then TFTP transfers the boot image named by BOOTP. Key point: Many systems come with unnecessary TFTP servers. Many TFTP servers have bugs, like the backtracking problem or buffer overflows. As a consequence, many systems can be exploited with TFTP even though virtually nobody really uses it. Key point: A TFTP file transfer client is built into many operating systems (UNIX, Windows, etc.). These clients are often used to download rootkits when being broken into. Therefore, removing the TFTP client should be part of your hardening procedure. 
Trivial File Transfer Protocol: this is a simplified version of FTP without authentication and many other basic features. Often used for booting devices over a network. 
The Trivial File Transfer Protocol (TFTP) is normally used only for booting diskless workstations. The tftp-server package provides the server for TFTP, which allows users to transfer files to and from a remote machine. TFTP provides very little security, and should not be enabled unless it is expressly needed. The TFTP server is run from/etc/xinetd.d/tftp, and is disabled by default on Red Hat Linuxsystems. 
Internet trivial file transfer protocol server. Tftpd is a server which supports the Internet Trivial File Transfer Protocol (RFC 783). The TFTP server operates at the port indicated in the `tftp' service description; see services(5). The server is normally started by inetd(8). 
Trivial File Transfer Protocol 
Terminal Group Controller 
Interactive 2-D drawing facility under X11. Tgif has little to do with GIF files. It is a 2-D vector based drawing program which can produce output suitable for LaTeX or in PostScript. 
Thai Linux Extension
The website is in Thai. Redmond Linux and compatible do appear in the text. Thailand based distribution. 
A base package for Thai environment under X11 This package contains some experimental stuffs for Thai environment. User, however, needs to do some manual configurations to complete the installation. Guidance is provided in /usr/share/doc/thai-system. 
Thai Latex package This package provides Thai language add-on for Latex. It is based on babel package which comes with tetex distribution. This package needs Thai words separator such as cttex and swath, in order for latex to be able to break sentences. 
Trident Hardware-Assisted MPEG-2/AC-3 (Trident, MPEG, DVD, AC-3) 
List of contributors to a package. 
Total Harmonic Distortion (audio) 
Total Harmonic Distortion plus Noise (audio), "THD+N" 
Full-screen character mode text editor. THE (The Hessling Editor) is a text editor that uses both command line commands and key bindings to operate. It is intended to be similar to the VM/CMS System Product Editor, XEDIT and to KEDIT from Mansfield Software. 
Technische Hoogeschool Eindhoven (OS), "T.H.E." 
The Hessling Editor 
Convert WindowMaker/GTK+/Sawmill theme packages to .debs This takes .tar.gz files from, for example, or gtk.themes.orig, and converts them into .deb packages. The .deb packages it produces are acceptable for local use, but are not really policy-conformant, notably since they cannot reliably create a reasonable /usr/doc/<theme>/copyright file. Packages made using this package are named "wmaker-<foo>-theme" for WindowMaker themes and "gtk-<foo>-theme" for GTK themes etc. 
Texas Higher Education NETwork (network, USA), "THEnet" 
Think Blue Linux
Think Blue was the original port of Linux to the IBM mainframe. ThinkBlue/64 7.1a, a respin of ThinkBlue/64 7.1 with all updates integrated was released October 11, 2001. (IBM) Note: Most of the Leading Distributions support IBM mainframes. 
ThinStation is a Linux distribution that enables you to convert standard PCs into full-featured diskless thinclients supporting all major connectivity protocols. It can be booted from the network using Etherboot/PXE or from standard media like floppy/CD/hd/flash-disk etc. The configuration is centralized to simplify terminal management. The initial Freshmeat release was on May 15, 2003, version 0.91. Version 0.92 was released June 12, 2003. A 'special purpose/mini' distribution. 
ThizLinux Labratory Ltd., home of the ThizLinux distribution, is based in Hong Kong. Products include Thiz Linux Desktop 6.0, Thiz Office 3.0 (an Open Office clone localized for Hong Kong users), and Thiz Server 6.0. Entry added August 20, 2002. 
A non-hierarchical, hyperlinked knowledge base. ThoughtTracker is a knowledge base application. Its purpose is to provide you with a searchable hyperlinked database of information and ideas. ThoughtTracker is localized for English, French, and German. 
A series of discussions posted on a listserver, Usenet newsgroup, or conference that deals with the same subject. 
A small piece of programming that acts as an independent subset of a larger program, also called a "process". A multithreaded program can run much faster than a monolithic, or single-threaded, program because several, or even many, different tasks can be performed concurrently, rather than serially (sequentially). Also, threads within a single application can share resources and pass data back and forth between themselves. 
threaded code
A technique for implementing virtual machine interpreters, introduced by J.R. Bell in 1973, where each op-code in the virtual machine instruction set is the address of some (lower level) code to perform the required operation. 
a port of the classic Commodore 64 game The object of the game is to lift the Klystron Pod from the bottom of a cave and return it safely to space. The Pod is very heavy (compared to the ship) and this makes it tougher than it may seem. You must be careful not to run out of fuel, crash into the cave walls, or let the enemy artillery outposts shoot you down. 
Token Holding Timer (FDDI, Token Ring) 
tiny/turbo/throttling HTTP server thttpd is a small, fast secure webserver. It features CGI support, URL-traffic-based throttling and basic authentication. thttpd has a very small memory footprint as it only forks itself in order to execute CGI scripts. It is designed to be as fast as fully featured web-servers and it performs extremely well under high load. According to the netcraft survey of April, thttpd is used by 365455 sites across the Internet. This package contains the thttpd server. For thttpd support programs see the thttpd-util package. 
An image that has been scaled down to a size suitable for previewing only. 
generate thumbnail images for a PDF file created with pdftex 
Technical Interchange (conference, IBM) 
Texas Instruments (manufacturer) 
An acronym for The Internet Adapter, a program that allows pseudo- SLIP connections from a normal shell account, TIA is distributed by SLiRP is a free program that performs a similar function. 
Telecommunications Industries Associations (org.) 
Thanks In Advance (slang, Usenet, IRC) 
The Internet Adapter [software] 
the terminfo entry-description compiler 
configurable text scroller Ticker is a simple program to scroll text across a line of the display, in a manner similar to a stock ticker. In fact, since ticker supports communicating with a program that changes the text periodically, it could be used to implement a stock ticker. 
Technical Information Document (Novell) 
Touch Interactive Display 
Sources for drivers for Texas Instruments calculators link cables This package will be useful to you if you own a Texas Instruments calculator and want to use one of the following link cables : o official "black cable" from Texas Instruments (BlackLink) o home-made serial link o home-made parallel cable o official GraphLink USB from Texas Instruments (SilverLink) This package contains the sources of the drivers, which you need to compile before using it. Please read /usr/share/doc/tidev-source/README.Debian for more informations on how to achieve that. You must have the parport driver built either in your kernel or as a module to use the tipar_dev driver. You need a kernel with the USB core to use the tiusb_dev driver. You'll also need a linking software such as TiLP to communicate with your calculator. 
Tool Integration Description Language (JCF) 
HTML syntax checker and reformatter Corrects markup in a way compliant with the latest standards, and optimal for the popular browsers. It has a comprehensive knowledge of the attributes defined in the HTML 4.0 recommendation from W3C, and understands the US ASCII, ISO Latin-1, UTF-8 and the ISO 2022 family of 7-bit encodings. In the output: * HTML entity names for characters are used when appropriate. * Missing attribute quotes are added, and mismatched quotes found. * Tags lacking a terminating '>' are spotted. * Proprietary elements are recognized and reported as such. * The page is reformatted, from a choice of indentation styles. Tidy is a product of the World Wide Web Consortium. 
merge or apply WEB change files 
Terminal Interface Equipment 
Tiemann, Michael
one of the original authors of the GNU C++ compiler. Ten years ago he co-founded Cygnus Support (now Cygnus Solutions) to commercialize support for the GNU compiler, debugger, and editor: gcc, gdb, and Emacs. 
Time Independent Escape Sequence (MODEM) 
Tag / Tagged Image File Format (Aldus) 
Texas Instruments Graphics Adapter (Texas Instruments) 
Report system security vulnerabilities TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs and data files which are used to perform a security audit of UNIX systems. TIGER has one primary goal: report ways 'root' can be compromised. Debian's TIGER incorporates new checks primarily oriented towards Debian distribution including: md5sums checks of installed files, location of files not belonging to packages and check of security advisories. 
tiger teams (sneakers)
A team of "white-hats" attack and secure systems. Some of these teams are given the task to penetrate the systems, other are just to review security procedures with an eye of how they might be penetrated. This is a favorite of government and paranoid organizations. Controversy: Tiger teams aren't afraid of prosecution and start with a greater degree of knowledge about the victim. Therefore, many people argue whether a successful penetration by a tiger team reflects a real-world scenario. For example, if you don't fear prosecution, then you might simply do a physical break-in. A physical break-in will always result in a successful "hack" because you can install keystroke loggers, password sniffers, or simply steal disk drives. Controversy: There are some cases where tiger teams have actually stolen sensitive information. History: This originally a military term, where teams would enter secure installations and leave behind notes like "bomb" or "theft" in sensitive areas to prove that they had been there, and that they could have left behind bombs or stolen secret plans. 
The enhanced version of VNC, called TightVNC (grown from the VNC TightEncoder project), which is optimized to work over slow networkconnections such as low-speed modem links. While original VNC may be very slow when your connection is not fast enough, with TightVNC you canwork remotely almost in real time in most environments. Besides bandwidth optimizations, TightVNC also includes many other improvements, optimizations and bugfixes over VNC. Note that TightVNC is free, cross-platform and compatible with the standard VNC. 
Telecommunications and Information Infrastructure Assistance Program (USA) 
Tcl/Tk client for the AOL Instant Messenger service From the TiK homepage ( TiK is a pure Tcl/Tk 8.1 version of AOL Instant Messenger (AIM). The TiK client began its life as a scaled down version of the native Windows and Macintosh clients. However, TiK now has most of the features the native clients have, plus some extras. TiK includes a graphical buddy list display plus packages for away messages, buddy pounce, buddy ticker, and im capturing. It is very easy for end users to add new features to TiK, using Tcl/Tk. TiK is meant to give UNIX users an alternative to the Java client. This release of TiK requires Tcl/Tk 8.1 or greater, unlike the previous releases, which only required 8.0 or greater. 
Tech Info Library (Apple, WWW) 
A TI calculator <-> PC communication program for X TiLP is a Texas Instruments calculator <-> PC communication program for Linux. It is able to use any type of link, like the original TI GRAPH-LINK (both black and grey cables), the homemade "$4 serial link", or the "$5 parallel link". It even supports the new TI GraphLink USB, using the tiglusb kernel module. See With TiLP, you can transfer files from your PC to your Texas Instruments calculator, and vice-versa. You can also make a screen dump, a backup, transfer a backup to the calculator, or take control of your TI from your PC, or even install a new version of AMS on your calc ! You might be interested in the tidev-modules-source package which allows you to build a set of three kernel modules. These modules are three drivers for different link cables (serial, parallel, USB) which require running TiLP with root privileges. With these modules loaded and the appropriate rights on the device nodes, this won't be necessary. 
Token Interface Module (Token Ring) 
get time in seconds 
The GNU time command. The `time' command runs another program, then displays information about the resources used by that program, collected by the system while the program was running. You can select which information is reported and the format in which it is shown, or have `time' save the information in a file instead of display it on the screen. The resources that `time' can report on fall into the general categories of time, memory, I/O, and IPC calls. The GNU version can format the output in arbitrary ways by using a printf-style format string to include various resource measurements. 
The GNU time utility runs another program, collects information about the resources used by that program while it is running and displays the results. Time can help developers optimize their programs. The resources that `time' can report on fall into the general categories of time, memory, I/O, and IPC calls. The GNU version can format the output in arbitrary ways by using a printf-style format string to include various resource measurements. 
time to live (TTL)
A quantity of time or instances that a program will attempt to send or receive information before the data is discarded due to inactivity. 
A method of allowing multiple users to share a processor by allocating each user a portion of the processor resources on a timed basis and rotating each user's processes within those time segments. (Also, see Multitasking.) 
A method of rotating processes that allows more than one user to have access to a computer system simultaneously. Each process is allocated a small segment of time in succession so that each user appears to have the computer to himself or hersel. 
The timeconfig package contains two utilities: timeconfig and setclock. Timeconfig provides a simple text mode tool for configuring the time parameters in /etc/sysconfig/clock and /etc/localtime. The set clock tool sets the hardware clock on the system to the current time stored in the system clock. 
Run a command with a time limit. timeout executes a command and imposes an elapsed time limit. When the time limit is reached, timeout sends a predefined signal to the target process. 
Flexible user timeout daemon timeoutd enforces the time restrictions specified in /etc/timeouts. When invoked in daemon mode (without any parameters) timeoutd backgrounds itself, then scans /var/run/utmp every minute and checks /etc/timeouts for an entry which matches that user, based on: - The current day and time" - The tty that the user is currently logged in on" - The user's login ID" - Any primary or secondary groups the user is in" Written by Shane Alderton <> 
TimeSys Linux/RT
TimeSys Linux provides a foundation for embedded systems with any kind of performance requirements. From non-real-time, to soft real-time, all the way to hard real-time, TimeSys Linux offers unsurpassed predictability, robustness, scalability, and is available on a variety of board/microprocessor configurations. TimeSys Linux 4.0 was released February 13, 2003. 
These are configuration files that describe possible time zones. 
Set system timezone, date, and time Ths timezoneconf program is a debconf-based utility to allow you to set your system's timezone, its system date, and the system time. Licensed under the GPL. 
MIDI to WAV converter and player 
Software-only MIDI sequencer. A software-only MIDI sequencer. Uses GUS-compatible MIDI patch files to either play MIDI scores in real time or to convert them into .wav files. Requires no hardware specific MIDI support. 
Timo's Rescue CD
Timo provides an easy way to generate a rescue system on a bootable CD, which can be easily adapted to your own needs. The project has evolved into a "Debian on CD" project, so it's not only possible to use the system as a rescue CD, it is also possible to install a whole Debian system on CD. Works with other distributions as well. A CD-based distribution. 
A full-screen easy to use Usenet newsreader. tin can read news locally (i.e. from /var/spool/news) or remotely (rtin or tin -r option) via a NNTP (Network News Transport Protocol) server. It will automatically utilize NOV (News OVerview) style index files if available locally or via the NNTP XOVER command. 
A curses personal information manager. Tina is a personal information manager with a curses interface. It allows the user to categorize short text items and to display the items in a particular category. 
Telecommunication Information Network Agent (IN) 
Telecommunication Information Networking Architecture (IN) 
TINA Consortium (org., IN, TINA), "TINA-C" 
There Is No Cabal! (slang, Usenet, Linux, Debian) 
Virtual Private Network daemon tinc is a daemon with which you can create a virtual private network (VPN). One daemon can handle multiple connections, so you can create an entire (moderately sized) VPN with only one daemon per participating computer. You need to have two kernel modules installed, on a Debian system they should already be there. If they are not, the manual will explain you how to do that. 
Tinfoil Hat Linux
Tinfoil Hat Linux started as a secure, single floppy, bootable Linux distribution for storing PGP keys and then encrypting, signing and wiping files. At some point it became an exercise in over-engineering. Now at version 1.0, THL is released under a BSD style license. 
TINT Is Not Tetris(tm) least the name isn't (: As the title suggests, this is a clone of the original tetris game written by Alexey Pajitnov, Dmitry Pavlovsky, and Vadim Gerasimov. I've tried to keep the game as close to the original as possible, but there is a few differences. Nevertheless, it's probably the closest to the original that you'll ever find in the UNIX world... 
Classic text-based MUD client Tintin++ is telnet client specialized to play MUDs (Multi-User Dungeons). It has scripting support, tab-completion, internal chat, and takes advantage of the GNU readline library. You can find a complete set of commands and features in the Tintin++ manual, in /usr/share/doc/tintin++. 
The website is available in English, French, Spanish, German, Portuguese and Italian. Tiny Linux is a small Linux distribution designed especially for old recycled computers. 
A _Tiny_ IRC Client A tiny, stripped down IRC Client. Doesn't have most of the more advance commands in the ircII family of IRC Clients, nor does it have any color, but it works, and its tiny. 
A lightweight, non-caching, optionally anonymizing http proxy An anonymizing http proxy which is very light on system resources, ideal for smaller networks and similar situations where other proxies (such as Squid) may be overkill and/or a security risk. Tinyproxy can also be configured to anonymize http requests (allowing for exceptions on a per-header basis). 
Tiny Transport Protocol (IRDA) 
Threaded I/O bench for Linux Tiobench is a file system benchmark especially designed to test I/O performance with multiple running threads. 
A related or contextual item that is displayed to remind a user of a particular function or action. Tooltips usually display an explanation of a certain object's functionality in a graphical application. 
Terminal Interface Processor (ARPANET) 
Transputer Image Processing 
System for processing phonetic symbols in LaTeX TIPA is a system for processing IPA (International Phonetic Alphabet) symbols in LaTeX written by Fukui Rei. TIPA stands for either TeX IPA or Tokyo IPA and derived from the tsipa package, made in 1992 by Kobayashi Hajime, Fukui Rei and Shirakawa Shun. Among many features of TIPA, the following are the new features as compared with tsipa or any other existing systems for processing IPA symbols: * A new 256 character encoding for phonetic symbols (`T3'), which includes all the symbols and diacritics found in the recent versions of IPA and some non-IPA symbols. * Complete support of LaTeX2e. * Roman, slanted, bold, bold extended and sans serif font styles. * Easy input method in the IPA environment. * Extended macros for accents and diacritics. * A flexible system of macros for `tone letters'. * An optional package (vowel.sty) for drawing vowel diagrams. * A slightly modified set of fonts that go well when used with Times Roman and Helvetica fonts. Type 1 fonts for TIPA are also included in this package. 
Texas Instruments Personal Computer (TI) 
Telecommunications and Internet Protocol Harmonization Over Networks (ETSI, WG) 
A program to learn touch typing This program was developed by the Tipptrainer Team <> who belong to the PingoS project (see to teach children how to type computer keyboards. Languages German and English available. 
Truevision Image Paint Software (TI) 
token's irc client Features: vi-like editor line and general usage, comfortable backscroll buffers with regex search mechanism in multiple screen regions, multiple pages that contain window regions, nickname completion, etc. TIRC doesn't have a scripting language. It is the author's belief that scripting languages do more harm by abuse than they're useful. 
Thai Industrial Standard 
Tools Interface Standard (SCO, Unix) 
Tokyo International Science Network (network) 
??? (manufacturer, France) 
A program to keep track of time. It puts up a list of projects, and the number of minutes worked on each. You click on the project you want to work on, and it starts counting on that. At the end of the day, it saves the collected data in a file, and you can use a script to process the data. "sumtitra" is one possible such script. 
The Tix library for Tk, version 4.1 -- runtime package The Tix library for Tk extends Tk with new widgets like: o panned windows, o hierarchical lists, o folders, o combo boxes, o help balloons, o and many others. The Tix look and feel is really good. Additionally, Tix eases construction of mega-widget and has a full-fledged C interface as well. Version 4.1 adds even more widgets. 
Windowing shell for interpreting Tix commands. ' 
Windowing shell for interpreting Tix commands. ' 
Tk is a X Windows widget set designed to work closely with the tcl scripting language. It allows you to write simple programs with full featured GUI's in only a little more time then it takes to write atext based interface. Tcl/Tk applications can also be run on Windows and Macintosh platforms. 
modular X Windows System network browser. Tkchooser is an interpreted, modular, extensible network browsing utility for X windows designed after the Macintosh Chooser. 
A graphical front-end to CVS TkCVS is a Tk based graphical interface to the CVS configuration management system. It includes facilities for providing "user friendly" names to modules and directories within the repository, and provides a facility to interactively browse the repository looking for modules and directories. Some of the features of TkCVS include: File and directory browser, with optional display of hidden files, and display of the current directory's location within the CVS tree. Push-button based check-in / check-out of CVS modules. Ability to add and delete files from the repository also using push buttons. Module tree browser, and reports showing the structure of the CVS modules tree. Individual modules or entire directory trees may be checked out using the browser. Updating of files from the repository when they change. Tagging and branching of files from the file browser, and tagging and branching of modules from the module browser. Exporting a CVS module or directory from the repository for delivery off-site. Creation of patch files between two releases of a module, or between a release and the current (head) version. Viewing of diff and status listings for currently checked out modules. 
Tk/tcl based X11 Desktop/File manager TkDesk is a graphical file manager for Unix (esp. Linux) and the X Window System. Compared with other file managers available, it offers the most complete set of file operations and services, plus gives the user the ability to configure most every aspect of TkDesk in a powerful way. TkDesk has been influenced by various other systems and file managers, such as NeXT, for laying out the file browser windows, Apple Finder, for the idea of file annotations and, shock horror, Windows 95, for some other inspirations. 
A graphical "diff" utility. TkDiff is a graphical front-end for the standard Unix 'diff' utility. Its features include highlighted difference regions (with a quick overview/navigation bar) and linked scrolling of files. It provides file-merge and change-summary facilities, line number toggling (for easier cut & paste) and support for RCS/CVS/SCCS. 
A TeX DVI previewer based on Tcl/Tk This program lets you look at the DVI files output by TeX. It is similar in spirit to xdvi but offers a richer user interface as well as some convenient features such as the possibility to look at `spreads' of two adjacent pages as well as a 4x4 page `overview'. This program is still in alpha test, which means that some important functionality like the ability to show included graphics is still missing, but it is quite usable as it is. Please report bugs or suggestions. 
A different xfontsel for displaying fonts. Tkfont allows you to view the various fonts in X11. It displays a list of fonts, you can then pick which one to display. 
Event driven digital circuit simulator with Tcl/Tk TkGate is a event driven digital circuit simulator with a Tcl/Tk-based graphical editor. TkGate supports a wide range of primitive circuit elements as well as user-defined modules for hierarchical design. The distribution comes with a number of tutorial and example circuits which can be loaded through the "Help" menu. The example circuits include a simple CPU, programmed to run the Animals game. For more information, check out the online documentation at 
tk interface to hylafax tkhylafax offers the following features: o Batching fax destinations o Builtin fax number database o Fast cover sheet generation o Cover sheet preview o Cover sheet ONLY transmission option o Directory browser o Fax job dequeuing made easier o Fax job scheduling made easier o Highly configurable 
tk/tcl info browser TkInfo is a tk script to read GNU "info" files and display them. TkInfo can be used stand alone (via WISH), or embedded within an application to provide integrated, on-line help. 
The Tkinter (Tk interface) program is an graphical user interface for the Python scripting language. You should install the tkinter package if you'd like to use a graphical user interface for Python programming. 
Tcl/Tk based client to the Internet Relay Chat tkirc is a frontend for unix's ircII (shell-client for the Internet Relay Chat) based on Tcl/Tk. 
Graphical SPARC emulator Instructional SPARC Emulator using tk. This SPARC CPU simulator has nice graphics, and is very good for learning assembly language programming. Particularly suited to the textbook "Computer Systems: Architecture, Organization, and Programming" by Arthur Maccabe. 
X Window System mail reader using Tcl/Tk This is an X Window System interface to mail built using Tcl/Tk. Reading, sending, and managing mail messages can almost all be done using only the mouse (except for the body of the message, of course). TkMail writes its folders in the format of the standard unix 'mail' command. It also uses 'sendmail' commands to do the mail delivery work. Major Features: - listbox interface to messages for easy click and read - multiple viewers can be opened on different or the same folder - dynamic (at startup) menus for quick access to mail folders for reading, copying, and moving messages - button bar for quick composing, replying to, and forwarding of mail messages - built in 'biff' icon for notification of new mail on multiple folders - easy inclusion of files into message compositions with automatic uuencoding and compression, if desired - access alternate editor for compositions to send - spell check compositions using a X windows interface - reads aliases from either standard .mailrc or elm aliases.txt - easy piping of message text through unix filters - emacs-like key-bindings for text editing - emacs-like autosave - sorting of messages on any field and the ability to write out the folder physically in that order 
A graphical, hypertext manual page and Texinfo browser TkMan is a graphical, hypertext manual page and Texinfo browser for UNIX. TkMan boasts hypertext links, (optional) outline view of pages with a novel information visualization mechanism called Notemarks, high quality display and unique interface to Texinfo documents, full text search among man pages, incremental and regular expression search within pages, robust yellow highlight annotations, a shortcut/hot list, lists of all pages in user configurable volumes, a comprehensive Preferences panel, man page versioning support, and unmatched online text formatting and display quality, among many other features. More information about TkMan can be found at 
NET SNMP (Simple Network Management Protocol) MIB Browser. The NET SNMP MIB Browser allows querying the NET and other SNMP agents. 
An audio mixer with Tk interface This is a compact audio mixer for X windows featuring nice Tk interface, equipped with slidebars, mute buttons, and a configuration facility. 
Versatile bitmap/pixmap editing tool Tkpaint is an easy to use graphics utility based on the canvas widget of Tcl/Tk. It can be very useful for drawing simple to complex figures, slide presentations, graphs, and diagrams that involve geometrical shapes, arrows, text, and colors. It is also possible to insert bitmaps and gif/ppm/pgm images. There is a large variety of operations that can be performed on a group of objects: scaling, rotation, relocation, reflection, and deformation with respect to inclination. 
Tcl/Tk script that serves as a GUI shell for PGP or GnuPG. TkPGP intends to completely eliminate need to access command- line interface of PGP for UNIX. Currently most of casual activity such as signing, encrypting and decrypting is done in GUI. Key management remains a domain of command line for the time being. 
Perl/Tk app. - Monitor hosts on network tkping is intended primarily for system administrators and network administrators who need to detect when crucial hosts and other network nodes go down. 
X-based process management tool similar to 'top' An X-based process management tool which generates output using ps and displays it using Tcl/Tk 
Tk based MUA TkRat is a graphical Mail User Agent (MUA) which handles MIME. It is mainly written in C but the user interface is done in tcl/tk. The program currently understands unix mailboxes, POP, IMAP and mh folders. Messages are sent via SMTP or any user configured program (for example sendmail). 
GUI front-end to the SETI@Home client for UNIX. TkSETI is a customizable frontend for the SETI (Search for Extra-Terrestrial Intelligence) client called SETI@Home. You will need to install the debian installation wrapper package setiathome for the SETI@Home client. TkSETI lets you monitor, start or stop the setiathome client, display statistics of how many SETI work units you helped process, among many other cool features. 
SMB (Samba and Windows) network browser This program provides you a graphical interface for browsing Windows networks. TkSmb does this by being a graphical wrapper around Samba's smbclient program. Using this program you can easily access different workgroups, hosts, and shares on it, mount this shares. 
Table extension for Tcl/Tk Provides tables and matrices in Tcl/Tk 
X11 tool to manage the Self-mode of USR/3COM Message modems. TkUsr is a small program that allows you to manage the Self-mode of USR/3COM Message (Plus), Professional Message modems. It features an intelligent retrieving of data with a cache system to speed up the download. So you do not have to download the full memory to get only one fax. It should be multi-platform as it is written in Tcl/Tk. 
Displays a list of (defined) machines to start VNC to. A basic wrapper that calls xvncviewer on a machine when requested. Unless the author beats me to it, I intend to add better password handling. 
a GUI to shell commands Wes's Own Real Lazy Desktop According to the README file: "The mission of tkWorld is to provide GUIs to the standard Unix utilities. All applications will have a standard look and feel, as well as provide point and click access to common command line options. Providing a common Application Interface will help beginners learn Unix, while giving advanced users easy access to the options they already know." 
Extended Tcl (TclX) version 8.2.0 -- TkX runtime package Extended Tcl (TclX), is a set of extensions to Tcl, the Tool Command Language invented by Dr. John Ousterhout. Tcl is a powerful, yet simple embeddable programming language. Extended Tcl is oriented towards system programming tasks and large application development. This package contains the TclX programs and libraries depending on Tk. 
Extended Tcl (TclX) version 8.3.0 -- TkX runtime package Extended Tcl (TclX), is a set of extensions to Tcl, the Tool Command Language invented by Dr. John Ousterhout. Tcl is a powerful, yet simple embeddable programming language. Extended Tcl is oriented towards system programming tasks and large application development. This package contains the TclX programs and libraries depending on Tk. 
render an image of a planet into an X window 
Transform and Lighting (3D), "T&L" 
Three Letter Acronym (slang) 
Token ring Link Access Protocol (LAP) 
Translation Lookaside Buffer (CPU) 
Top Level DOMAIN (Internet, ICANN) 
TLD (Top Level Domain)
The last (right-hand) part of a complete Domain Name. For example in the domain name ".net" is the Top Level Domain. There are a large number of TLD's, for example .biz, .com, .edu, .gov, .info, .int, .mil, .net, .org, and a collection of two-letter TLD's corresponding to the standard two-letter country codes, for example, .us, .ca, .jp, etc. 
Blinks keyboard LEDs indicating TX and RX network packets. These programs help you monitor network traffic. They blink Scroll-Lock LED (Light Emitting Diode) when a network packet leaves the machine, and Num-Lock LED when one is received. WARNING: On some systems this has been known to render part or all of the keyboard unusable, this is rare and usually only happens on a few laptops and keyboards with overly long or old cables.. (This includes the IBM thinkpad 600 laptop, and the HP Omnibook XE2) 
Transport Layer Interface 
Transport Level Interface (AT&T) 
Trunk Line Network 
graphic representation of system load average 
Transmission Level Point 
See transport layer security (TLS). 
stands for Transport Layer Security and is the protocol which almost all security enabled browsers use. It was designed by Netscape and was formerly known SSL or Secure Sockets Layer. 
Thread Local Storage 
Transport Layer Security [protocol] (SSL) 
Transport Layer Security Protocol (ISO) 
Type - Length - Value 
Terminated Low Voltage Transistor Transistor Logic 
TeleMail (BBS, Berlin, Germany, DFUe) 
Terminal Manager (Bull, DSA) 
Tools for MIME (EMACS, GNU, MIME) 
Traffic Management 
Transaction Monitor (TP) 
Turing Machine 
Thinfilm Micromirror Array 
Mail Delivery Module 
a cross-platform makefile tool tmake is an easy-to-use tool from Trolltech to create and maintain makefiles for software projects. It can be a painful task to manage makefiles manually, especially if you develop for more than one platform or use more than one compiler. tmake automates and streamlines this process and lets you spend your valuable time on writing code, not makefiles. tmake is mainly used to generate makefiles for applications that use the Qt toolkit. 
Taiwan Mycomp Corporation (manufacturer) 
Thinking Machines Corporation (manufacturer) 
Traffic Message Channel 
Time-Multiplexed Communication Channel 
Tagged Message Delivery Agent TMDA is an OSI certified software application designed to significantly reduce (or eliminate) the amount of SPAM/UCE (junk-mail) you receive by using unique, cryptographically enhanced (tagged) e-mail addresses. TMDA can both filter your incoming e-mail, and tag your outgoing address. TMDA was originally based upon a Perl script written by Thomas Erskine called Tagged Message Sender (TMS), but has since evolved into a significantly larger and more featureful application. 
Tivoli Management Data Base (Tivoli, DB) 
Tmdns is tiny/trivial Multicast DNS Responder for Linux. It should allow you to take part in a zeroconf environment. 
Transition Minimized Differential Signaling (VESA, LCD) 
Transmission Minimized Digital Signal 
Telocator Message Entry [protocol] (SNPP) 
Tivoli Management Environment (Tivoli) 
Tivoli Management Framework (Tivoli) 
Transaction Monitoring Facility (DB, Tandem) 
TestMusterGenerator (IC) 
The Master Genealogist 
Telecommunication Management Network (IN) 
If set to a value greater than zero, the value is interpreted as the number of seconds to wait for input after issuing the primary prompt. Bash terminates after waiting for that number of seconds if input does not arrive. 
Test Management Protocol 
Test Management Protocol Data Unit (ISO 9646-1, PDU), "TM-PDU" 
Cleans up files in directories based on their age This package provides a program that can be used to clean out temporary-file directories. It recursively searches the directory, refusing to chdir() across symlinks, and removes files that haven't been accessed in a user-specified amount of time. You can specify a set of files to protect from deletion with a shell pattern. It will not remove files owned by the process EUID that have the `w' bit clear, unless you ask it to, much like `rm -f'. `tmpreaper' will not remove symlinks, sockets, fifos, or special files unless given a command line option enabling it to. WARNING: Please do not run `tmpreaper' on `/'. There are no protections against this written into the program, as that would prevent it from functioning the way you'd expect it to in a `chroot(8)' environment. The daily tmpreaper run can be configured through /etc/tmpreaper.conf . 
The tmpwatch utility recursively searches through specified directories and removes files which have not been accessed in a specified period of time. Tmpwatch is normally used to clean up directories which are used for temporarily holding files (for example, /tmp). Tmpwatch ignores symlinks, won't switch filesystems and only removes empty directories and regular files. 
Transient Memory Record 
Triple Modular Redundancy 
Telecommunications / Telephone Management System 
Test Mode Select (TAP, IC) 
Time Multiplexed Switch 
Truth Maintenance System (AI) 
Tape Mass Storage Control (DEC) 
Tape Mass Storage Control Protocol 
Temporary Mobile Subscriber Identity (MM, GSM, mobile-systems) 
There's More Than One Way To Do It. (tim-toh'-dee) (Motto of the Perl Project) 
Time Measurement Unit 
Transport MUltipleXing protocol (RFC 1692), "TMux" 
Terminal Node 
5250 telnet emulator for accessing an IBM AS/400 tn5250 connects to an IBM AS/400 and emulates a 5250-compatible terminal or printer. It runs on the linux console, in an xterm, or on any other character terminal. You should install xterm to use the xt5250 script. If you don't know what an AS/400 is, you don't need this package. 
Terminal Node Controller 
Threaded Neill Concelman [connector] 
Tool to unpack MIME application/ms-tnef attachments The TNEF program allows one to unpack the attachments which were encapsulated into the TNEF attachment. Thus alleviating the need to use Microsoft Outlook to view the attachment 
Transportation Neutral Encapsulation Format (MAPI, MIME, MS) 
Trusted Network File System (NFS) 
Technical NewsLetter (IBM) 
Twisted Nematic Liquid Crystal Display (LCD), "TN-LCD" 
Taiwanese New Pc Consortium (org., Taiwan) 
Transit Network Selection 
Too Numerous To Count (slang, Usenet, IRC) 
TelNet Visual Information Projection [protocol] (TELNET, VIP, RFC 1921) 
Small yet powerful program for tape oriented backups. tob is a simple yet configurable shell-script which, given a set of `volume definitions', runs tar or afio based backups, either for use with tape drives or floppy disks. You could also mount and unmount partitions for backups in the pre- and post-commands. tob is a general driver for the making and maintaining of backups. It makes full backups, differential backups (of the files which were changed since the last full backup), incremental backups (of files changed since all previous backups), lets you determine the size of the backup before actually making it, maintain listings of made backups, make remote backups and possibly more. 
T-Online Billing (T-Online) 
Table Of Contents (CD) 
A free implicit/explicit finite element analysis program Tochnog is a program for finite element analysis. Multithreading and multiprocessor systems are supported. Here is a partial list of models supported: * Differential equations (materials). * Convection-diffusion equations, * Stokes and Navier-Stokes, * Elasticity (isotropy and transverse isotropy), * Plasticity (Von-Mises, Mohr-Coulomb, Gurson, etc.; plasticity surfaces can be arbitrarily combined). Residues in equations and error estimates for all data can be printed/plotted. Main Author: Dennis Roddeman <> Home Page: 
TODO file
List of future desired work to be done to package. 
Converts text files between DOS and Unix formats. 
Transactions on Database Systems (ACM, DB) 
table of (terminfo) entries 
Technical Original Equipment Manufacturer 
Text Oben, Full-quote Unten (slang, Usenet) 
vt. To change a bit from whatever state it is in to the other state; to change from 1 to 0 or from 0 to 1. This comes from `toggle switches', such as standard light switches, though the word `toggle' actually refers to the mechanism that keeps the switch in the position to which it is flipped rather than to the fact that the switch has two positions. There are four things you can do to a bit: set it (force it to be 1), clear (or zero) it, leave it alone, or toggle it. (Mathematically, one would say that there are four distinct boolean-valued functions of one boolean argument, but saying that is much less fun than talking about toggling bits.) 
TOKen-Ring Extended User Interface (IBM, Token Ring) 
Tom Linux
Distribution and website are in Chinese. 
Java Servlet 2.2 engine with JSP 1.1 support Jakarta-Tomcat is the reference implementation for the Java Servlet 2.2 and JavaServer Pages (JSP) 1.1 specification from the Apache Jakarta project. For more information about Tomcat please take a look at the Tomcat home page at The official Servlet 2.2 and JSP 1.1 specifications can be found at and 
Java Servlet 2.3 engine with JSP 1.2 support Jakarta-Tomcat 4.0 is the reference implementation for the Java Servlet 2.3 and JavaServer Pages (JSP) 1.2 specification from the Apache Jakarta project. This package just contains the startup scripts for Tomcat 4.0. No documenation or web applications (webapps) are included here, please install the tomcat4-webapps package if you want them. For more information about Tomcat please take a look at the Tomcat home page at The official Servlet 2.3 and JSP 1.2 specifications can be found at and 
Java Servlet engine -- documentation and example web applications Jakarta-Tomcat 4.0 is the reference implementation for the Java Servlet 2.3 and JavaServer Pages (JSP) 1.2 specification from the Apache Jakarta project. This package contains the HTML documentation and some web applications (webapps) that were bundled with Tomcat 4.0: * examples: Example servlets and JSP pages with source code * manager: A Web admin interface for Tomcat * tomcat-docs: HTML documentation for Tomcat * webdav: WebDAV access to local files (e.g. using cadaver) For more information about Tomcat please take a look at the Tomcat home page at The official Servlet 2.3 and JSP 1.2 specifications can be found at and 
Transactions on Mathematical Software (ACM) 
"The most GNU/Linux on 1 floppy disk." Tom's Root Boot (tomsrtbt) is possibly the best known and widely used recovery disk version of Linux. Version 2.0.103 was released May 4, 2002. 
Tomukas is a small Linux mini-distribution, featuring busybox, tinylogin, mc, joe, ssh, X-window with fvwm1 and not much else. Not for beginners. A small disk distribution. 
Transactions on Office Information Systems (ACM) 
1. n. A program used primarily to create, manipulate, modify, or analyze other programs, such as a compiler or an editor or a cross-referencing program. Oppose app, operating system. 2. [Unix] An application program with a simple, `transparent' (typically text-stream) interface designed specifically to be used in programmed combination with other tools (see filter, plumbing). 3. [MIT: general to students there] vi. To work; to study (connotes tedium). The TMRC Dictionary defined this as "to set one's brain to the grindstone". See hack. 4. n. [MIT] A student who studies too much and hacks too little. (MIT's student humor magazine rejoices in the name "Tool and Die".) 
[conference on] Technology of Object-Orientated Languages and Systems (OOP, conference) 
MPEG-1 layer 2 audio encoder toolame is a very fast (6x realtime on a 550mhz celeron) MPEG-1 layer 2 audio encoder with a command-line syntax nearly identical to that of the lame MPEG-1 layer 3 audio encoder. Because of patent issues surrounding the layer 3 encoder, the ability of most mpeg audio players to play layer 2 files, and the similarity in command-line syntax, toolame makes a very good drop-in replacement for lame or other layer 3 encoders under most circumstances. 
Fancy toolbar for XEmacs21 This package Provides color toolbar for XEmacs21. 
The GNU binutils and gcc source code This is the GNU toolchain source code that can be used to produce the GNU compilers, assembler, linker, and binary utilities. It is used by the different cross-compiler packages so that this source code does not need to be duplicated in all of them. You might also use this package to compile your own version of the toolchain if you need some special compile-time options applied. This package also contains two scripts, tpkg-make and tpkg-update, to automatically create and update crosscompiler-packages for any target architecture supported upstream. They are described in /usr/share/doc/toolchain-source/README. 
n. The software equivalent of a tool-and-die specialist; one who specializes in making the tools with which other programmers create applications. Many hackers consider this more fun than applications per se; to understand why, see uninteresting. Jon Bentley, in the "Bumper-Sticker Computer Science" chapter of his book "More Programming Pearls", quotes Dick Sites from DEC as saying "I'd rather write programs to write programs than write programs". 
n. The Bourne-Again Super-user. An alternate account with UID of 0, created on Unix machines where the root user has an inconvenient choice of shell. Compare avatar. 
display top CPU processes 
Technical and Office Protocols 
The OS-9 Project (OS-9) 
Total On-Line Program and Information Control System 
Transactions on Programming Languages and Systems (ACM) 
TopologiLinux is a free easy to install Linux distribution that runs on top of a DOS/WIN harddisk without partitioning the disk. It is based on Slackware 8.1 with some improved packages like kernel 2.4.19 with Xwindows 4.2, gnome 1.4.1, and kde 3.01, and more. TopologiLinux v1.0 was released August 25, 2002. Version 3.1.0 was released April 29, 2003. 
The physical or logical architecture of a private computer network. 
A clone of the "Nebulous" game on old 8 and 16 bit machines. Toppler is an almost complete reimplementation of the old game known as Tower Toppler or Nebulous. The target of the game is to reach the target door of each of the 8 towers in currently 2 missions with this little green animal. This door is usually at the very top of the tower. But finding the way by using elevators and walking through a maze of doors and platforms is not the only problem you have to solve. There are a bunch of other creatures living on the tower that will hinder you to reach your target by pushing you over the edge of the platforms. 
Timesharing / Total OPerating System (DEC, OS) 
A graphical toolkit for database developers and administrators. Tora features a schema browser, SQL worksheet, PL/SQL editor & debugger, storage manager, rollback segment monitor, instance manager, and SQL output viewer. Via qt3 it can access PostgreSQL and MySQL directly. Any other database systems can be accessed via ODBC. 
Torvalds, Linus
The creator of the Linux operating system, Linus Torvalds began this work back in 1991 as part of his University studies. Linus holds the Linux trademark and acts as coordinator of the linux development project. 
Torvalds, Linus
The original creator of the Linux kernel in 1991, holder of the Linux copyright, and currently still the coordinator of the Linux development project. 
Tape Operating System (OS, RCA Spectra 70) 
Teletype Operating System (OS, Microdata) 
The Operating System (Atari, OS) 
Tramiel Operating System (Atari, OS) 
Type Of Service (IP) 
Tape ??? Operating System /360 (IBM, S/360, OS), "TOS/360" 
Access much of the Toshiba laptop hardware interface. Toshset ia a command-line tool to allow access to much of the Toshiba laptop hardware interface developed by Jonathan Buzzard. It can do things like set the hard drive spin-down time, turn off the display and set the fan speed without the help of the kernel. The difference to toshutils is, that it does not need X or kernel-support. 
Toshiba laptop utilities This is a collection of utilities to control a Toshiba laptop. It includes programs to turn the fan on and off, to view the power mode, and to set the supervisor password. 
Totally Off-Topic (slang, Usenet, IRC) 
A command that changes the date/time stamp of a file without affecting the contents. 
change file timestamps 
change file timestamps 
changes the access and/or modification timestamps of each specified file. These timestamps are changed to the current time, unless the -r option is specified, in which case they are changed to the corresponding timestamps of the file ref_file, or the -t option is specified, in which case they are changed to the specified time. 
Transaction Processing 
Turbo Pascal (Borland) 
Twisted Pair [cable] (LAN) 
Transport Protocol class 0 (OSI) 
Transport Protocol class 4 (OSI) 
Third Party Applications 
Transient Program Area (DOS) 
Transaction Processing Council (org., manufacturer, DB) 
Third Party Call Control 
A program to configure touchpad devices. This program can show or modify the configuration of several different kinds of touchpad devices, including the Synaptics TouchPad and the ALPS Glidepad/Stickpointer. 
ThinkPad configuration tools for Linux This package contains programs for configuring IBM ThinkPad laptop computers. The tpctl program, along with its ncurses variant ntpctl, does under Linux some of the things that PS2.EXE does under DOS and the ThinkPad Configuration program does under Windows. The apmiser daemon is an intelligent power expenditure controller. Most programs in the package require a thinkpad-modules package compatible with the kernel you are running. If there is no such package in the Debian archive, you can build one from the thinkpad-source package using the make-kpkg utility. 
Technical Product Documentation 
Twisted Pair Distributed Data Interface (FDDI, STP, Chipcom) 
Transport Protocol Data Unit (OSI, OSI/RM, PDU, ICC) 
Twisted Pair Ethernet (ethernet) 
Transaction Processing Facility (IBM, MVS/XA) 
Tracks Per Inch (HDD) 
Transaction Processing Management System 
Twisted Pair Physical layer Medium Dependent (FDDI), "TP-PMD" 
True Phone Quality (CAT) 
??? (Sun) 
TeleProcessing Systeme [gmbh] (provider) 
Transaction Processing System 
Transactions Per Second (DB, DBMS) 
Twisted Pair Transceiver 
Turbo Pascal Unit (TP, Borland) 
initialize a terminal or query terminfo database 
Turbo Pascal for Windows (Borland) 
Task Register (CPU, Intel, assembler, IC) 
translate or delete characters 
traceback error
In a computer program failure, a display showing the calling sequence of a function leading up to the error, which can make it easier for the programmer to determine the location of the error. 
provides information concerning the route which packets must take to get from your computer (the server in this case) to a remote computer/server; typically used to diagnose possible problems in packet routing. 
Traceroute is a command built into most systems that traces the path through the Internet between two points (on Windows, it is known as "tracert"). Every IP packet on the Internet has a Time-to-Live field. Each router subtracts one from this field when it forwards the packet. This was designed to solve the problem of "routing loops": routers get confused as to the proper network topology and end up routing packets in an infinite loop. The TTL field guarantees that these packets will eventually die on their own accord. When a packet dies in this fashion, the last router to see the packet sends a diagnostic message back to the sender informing of this fact. Consequently (and this is the genius part), you can purposely create small TTLs that are guaranteed to kill the packet. You set the TTL field first to 1, causing the first router to drop it and inform you. You set the TTL field to 2, causing the second router to drop it. You do this for all TTL values, getting back a notification from each router in the network, thus mapping the route between two points. 
Traces the route taken by packets over a TCP/IP network. The traceroute utility displays the route used by IP packets on their way to a specified network (or Internet) host. Traceroute displays the IP number and host name (if possible) of the machines along the route taken by the packets. Traceroute is used as a network debugging tool. If you're having network connectivity problems, traceroute will show you where the trouble is coming from along the route. Install traceroute if you need a tool for diagnosing network connectivity problems. 
NANOG traceroute This is the traceroute program maintained by Ehud Gavron at It is based on the Van Jacobson/BSD traceroute and has additional features like AS lookup, TOS support, microsecond timestamps, path MTU discovery, parallel probing and others. 
traffic shaper
a virtual network device that makes it possible to limit the rate of outgoing data flow over another network device. This is specially useful in scenarios (as ISP's), in which it is desirable to control and enforce policies regarding how much bandwidth is used by each client. 
gather and store traffic information into an SQL database. This program uses the Packet CAPture library libpcap to gather network traffic data and then stores it in a PostgreSQL database. 
Remote file access in emacs. TRAMP stands for `Transparent Remote (file) Access, Multiple Protocol'. This package provides remote file editing, similar to ange-ftp and EFS. The syntax is a bit different though (the brackets must be there): /[host]dir or /[method/host]dir The other difference is that ange-ftp uses FTP to transfer files between the local and the remote host, whereas TRAMP uses a combination of rsh and rcp or other work-alike programs, such as ssh/scp. A emacs elisp tool to edit files on remote host using telnet, rsh, scp, ssh and more. 
A German-English translation dictionary A German-English dictionary with ca. 124,000 entries. This dictionary was designed for the "ding" dictionary lookup program, but may be used by other clients, too. 
microwave and RF transmission line calculator Transcalc is an analysis and synthesis tool for calculating the electrical and physical properties of different kinds of RF and microwave transmission lines. Transcalc is built using the GIMP toolkit (GTK) for its GUI interface. For each type of transmission line, using dialog boxes, you can enter values for the various parameters, and either calculate its electrical properties (analyze), or use the given electrical requirements to sythesize physical parameters of the required transmission line. Available transmission lines (this list will expand with subsequent releases): Microstrip, Rectangular Waveguide. 
Transcribe speech data using an integrated editor. Transcriber is a Tcl/tk tool, that enables easy transcription of recorded speech. It indispensable for every task that involves examination and transcription of audio files, like transcription of recorded interviews, song lyrics, radio shows and so on. It is also useful if you are active in the field of speech research. The snack library (included in contrib in transcriber-1.2) is now a separate package. This package still includes html_library-0.3. 
Utilities for printing figures from xfig. transfig also contains utilities for converting xfig figures to be used in LaTeX files. Note: transfig requires netpbm-nonfree be installed for gif support. 
An XSLT processor TransforMiiX is a fast standalone XSLT processor. It aims to be fully XSLT 1.0 compliant, although it hasn't achived that goal yet. 
translates given words from english to german or vice versa It looks up a word in a file with language-to-language translations (field separator should be \" :: \") and maintains local dictionaries. So it should be easy to add more languages, if you have such a dictionary. 
any-to-any document translation system This is a command-line front end to many document format translation programs to facilitate the translation of documents from one format to another. Currently it supports major formats like the docbook, linuxdoc, debiandoc, and TeX, translating to HTML and ps and text. 
transmission control protocol (TCP)
The most common Internet transport layer protocol, defined Internet Engineering Task Force (IETF) request for comment (RFC) 793; protocol used in networks that follow U.S. Department of Defense data communication standards. 
transmission control protocol on top internet protocol (TCP/IP)
Communications protocol used to connect to a variety of different types of hosts on both private networks and carrier networks such as the Internet. 
transport layer security (TLS)
A secure transmission protocol using data encryption and authentication. 
Transparent Proxy Daemon for HTTP requests The program is used in conjunction with the Linux Transparent Proxy networking feature, and ipfwadm, to transparently proxy HTTP and other requests. 
1. n. A program interrupt, usually an interrupt caused by some exceptional situation in the user program. In most cases, the OS performs some action, then returns control to the program. 2. vi. To cause a trap. "These instructions trap to the monitor." Also used transitively to indicate the cause of the trap. "The monitor traps all input/output instructions." This term is associated with assembler programming (`interrupt' or `exception' is more common among HLL programmers) and appears to be fading into history among programmers as the role of assembler continues to shrink. However, it is still important to computer architects and systems hackers (see system, sense 1), who use it to distinguish deterministically repeatable exceptions from timing-dependent ones (such as I/O interrupts). 
Tandem Recursive Algorithm Process 
trap door
n. (alt. `trapdoor') 1. Syn. back door -- a Bad Thing. 2. [techspeak] A `trap-door function' is one which is easy to compute but very difficult to compute the inverse of. Such functions are Good Things with important applications in cryptography, specifically in the construction of public-key cryptosystems. 
A synonym for the term back-door. The word trap-door often has some specific connotations. It often means a tiny piece of code left behind in the system that will allow the original programmer back in. Also, the trap-door one-way function is one where the function can be reversed the other-way if some small piece of information is given. 
vt. To destroy the contents of (said of a data structure). The most common of the family of near-synonyms including mung, mangle, and scribble. 
Texture and Rendering Engine Compression (???) 
displays directory tree, in color Displays an indented directory tree, using the same color assignments as ls, via the LS_COLORS environment variable. 
[Biology] Reconstruction of phylogenetic trees by maximum likelihood TREE-PUZZLE (the new name for PUZZLE) is an interactive console program that implements a fast tree search algorithm, quartet puzzling, that allows analysis of large data sets and automatically assigns estimations of support to each internal branch. TREE-PUZZLE also computes pairwise maximum likelihood distances as well as branch lengths for user specified trees. Branch lengths can also be calculated under the clock-assumption. In addition, TREE-PUZZLE offers a novel method, likelihood mapping, to investigate the support of a hypothesized internal branch without computing an overall tree and to visualize the phylogenetic content of a sequence alignment. URL: 
Transfer Rate of Information Bits 
Tiled Raster Interchange Format 
Trinity Rescue Kit
The Trinity Rescue Kit is based on Mandrake 9.0. It is designed to rescue/repair/prepare dead or damaged systems, be it Linux or Windows. It now has networking capabilities like ssh and samba and supports about every network card, disk controller and USB controller. Version 1.0 was released March 7, 2003. A CD-based distribution. 
TrinityOS is a step-by-step, example-driven HOWTO on building a very functional Linux box with strong security in mind. TrinityOS is well known for its strong packet firewall ruleset, Chrooted and Split DNS (v9 and v8), secured Sendmail (8.x), Linux PPTP, Serial consoles and Reverse TELNET, DHCPd, SSHd, UPSes, system performance tuning, the automated TrinityOS-Security implementation scripts, and much more. The current version is 04/08/2003 released April 8, 2003. 
Trinux is a ramdisk-based Linux distribution that boots from a single floppy or CD-ROM, loads it packages from an HTTP/FTP server, a FAT/NTFS/ISO filesystem, or additional floppies. Trinux contains network security tools as well as support for Perl, PHP, and Python scripting languages. Remote Trinux boxes can be managed securely with OpenSSH. Version 0.80rc2 was released February 4, 2002. A 'special purpose/mini' distribution. 
Triple DES (3DES, 3DES_EDE)
A stronger form of DES where the algorithm is applied three times in order to encrypt data. Triple DES became necessary in the later part of the 20th century because DES had become so weak (a $200k machine was able to decrypt a DES encrypted message in hours). At that time, the new AES replacement had not yet appeared. In order to leverage DES hardware/software products, it was decided just to use DES three times with multiple keys. Point: Triple DES runs in "E-D-E" mode where it encrypts the data with the first key, then decrypts it with the second key, then encrypts with the third key. The second "decryption" phase is really just an encryption step: it is only by convention that one direction is considered encryption and the other direction decryption. The reason this technique is chosen is that if the same key is supplied three times, the effect is the same as a single encryption step. Controversy: The NSA urged banks not to adopt Triple-DES as a standard, citing national security concerns. They instead urged banks to adopt the Clipper chip. The banks went with Triple-DES in ANSI X9.52. In fact, as of 1998, several countries mandated the use of Triple-DES (replacing DES) in financial transactions. Controversy: Simply tripling the encryption does not necessarily triple its strength. For example, there are many crypto algorithms whereby encrypting with two different keys simply means you can decrypt with a single third key. Many suspect that tripling DES only doubles is cryptographic strength. 
Trade Related aspects of Intellectual Property rightS (GATT) 
Tripwire is a tool that detects when files have been altered by regularly recalculating hashes of them and storing the hashes in a secure location. The product triggers when changes to the files have been detected. By using cryptographic hashes, tripwire is often able to detect subtle changes. Contrast: The simplistic form of tripwire is to check file size and last modification time. However, programs that change files (like viruses) will often keep these the same. On the other hand, keeping complete backups would require too much space. Therefore, cryptographic hashes are used. Contrast: The cryptographic hash calculated from the file is often known as a "fingerprint" or "signature". However, these terms have completely different meanings in other areas of security, so some people just say "hash" or "checksum". History: The original tool was published in 1992 for Unix. The company Tripwire Inc. was formed in 1998. Point: Reasons why files change: Replace common system programs with duplicates contains backdoors. Change configuration files to allow intruder back into the system. Alter system logfiles in order to cover tracks. Alter data files (such as financial records or school grades). 
Teorija Reschenija Isobretatelskich Zadatsch 
Technical Reference Model 
Token Ring Management Module (Token Ring) 
/T'rof/ or /trof/ n. [Unix] The gray eminence of Unix text processing; a formatting and phototypesetting program, written originally in PDP-11 assembler and then in barely-structured early C by the late Joseph Ossanna, modeled after the earlier ROFF which was in turn modeled after the Multics and CTSS program RUNOFF by Jerome Saltzer (that name came from the expression "to run off a copy"). A companion program, nroff, formats output for terminals and line printers. In 1979, Brian Kernighan modified troff so that it could drive phototypesetters other than the Graphic Systems CAT. His paper describing that work ("A Typesetter-independent troff," AT&T CSTR #97) explains troff's durability. After discussing the program's "obvious deficiencies -- a rebarbative input syntax, mysterious and undocumented properties in some areas, and a voracious appetite for computer resources" and noting the ugliness and extreme hairiness of the code and internals, Kernighan concludes: None of these remarks should be taken as denigrating Ossanna's accomplishment with TROFF. It has proven a remarkably robust tool, taking unbelievable abuse from a variety of preprocessors and being forced into uses that were never conceived of in the original design, all with considerable grace under fire. The success of TeX and desktop publishing systems have reduced troff's relative importance, but this tribute perfectly captures the strengths that secured troff a place in hacker folklore; indeed, it could be taken more generally as an indication of those qualities of good programs that, in the long run, hackers most admire. 
format documents 
Typesetter New Run-OFF (Unix) 
Converts troff source to HTML, RTF, and plain text. Use this package to convert manuals and manpages and other documents written using troff to more manageable formats, such as HTML, RTF, or plain text. 
A class of malware, the word trojan refers to the classic Trojan Horse from the Iliad. In this story, after giving up on sieging the fortified city of Troy, the Greeks left behind a present. This consisted of a large wooden horse left at the outskirts of the town. After seeing the Greeks sail off, the citizens brought the wooden horse into town. The horse contained Greek warriors, who promptly jumped out, killed a bunch of people, and opened the city gates, letting in the Greek army who had actually been hiding rather than sailing off with the ships. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is likely trojaned with some subversive purpose. It might contain a virus, a password-grabber, or consist of a remote admin trojan designed to allow remote control over your machine. Contrast: Whereas the general popular uses the word virus to refer to any malware, a Trojan is not technically a virus. Generally, Trojans do not spread to other programs or other machines. Key point: The word can be used as a verb. To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Rootkits often contain a suite of such trojaned programs. Key point: Users can often break into a system by leaving behind trojaned command programs in directories (like their own directory or the /tmp directory). If you copy your own ls program to the /tmp directory, and somebody else does a cd /tmp then an ls, that user will run your program with their own privileges. This is especially dangerous against root, which is why the local directory should not be part of the search path for the root account. Contrast: A big fear is the transitive trojan -- a trojan horse that generates other trojans. The best example is the trojan described by Ken Thompson. He put a trojan horse into the C compiler so that when the login code was compiled, it would always accept a backdoor password. A common technique to guard against that is to first recompile the compiler first. Thompson therefore trojaned the compiler so that when it recompiled itself, it would put back the trojan. Therefore, even when you had the complete source to UNIX and compiler, you still couldn't recompile from scratch and remove the trojan. The fear is that tool vendors might put such trojans in their compilers, which cause products made from those compilers to have backdoors. 
Trojan Horse
A computer program is either hidden inside another program or that masquerades as something it is not in order to trick potential users into running it. For example a program that appears to be a game or image file but in reality performs some other function. The term "Trojan Horse" comes from a possibly mythical ruse of war used by the Greeks sometime between 1500 and 1200 B.C. A Trojan Horse computer program may spread itself by sending copies of itself from the host computer to other computers, but unlike a virus it will (usually) not infect other programs. 
Token Ring Optimized Link Interface (Token Ring) 
The Realtime Operating system Nucleus 
A 2D car racing action game. Trophy is a single-player racing game for Linux. Even though the goal is basically to finish the laps as the first, Trophy is an action game which offers much more than just a race. Lots of extras enable "unusual" features for races such as shooting, putting mines and many others. This package contains the executable. 
Token Ring serial Port 
Token Ring Repeater 
A type training software on GNU Emacs. This is just a beta version. Trr19 won't work with XEmacs. 
Scripts for reencoding text files and BDF-fonts. The script `trbdf' can convert a BDF font from one codeset to another. The script `trcs' reencodes text files from one codeset to another. It can generate scripts for `tr'. For example the command trcs --from cp1252 --to latin1 --gen-script gives you the following output: #!/bin/sh trap "exit 0" PIPE cat "$@" | tr \ '\200''\201''\202''\203''\204''\205''\206''\207''\210''\211''\212'\ '\213''\214''\215''\216''\217''\220''\221''\222''\223''\224''\225'\ '\226''\227''\230''\231''\232''\233''\234''\235''\236''\237' \ '\105''\77''\47''\146''\42''\267''\53''\77''\136''\77''\123'\ '\253''\117''\77''\132''\77''\77''\47''\47''\42''\42''\267'\ '\-''\-''\176''\77''\163''\273''\157''\77''\172''\131' Both scripts try to approximate the missing from the target codeset symbols. It is easy to add support of other character sets. 
Token Rotation Timer (FDDI, Token Ring) 
transfer big files through e-mail truc & untruc are two shell scripts that allow you to transfer big files through e-mail. They are using classical commands such as uuencode, tar, compress, csplit, etc. The word 'truc' (French) means: "Transfert Rapide Uuencode' Compresse'". 
do nothing, successfully 
pretty printing of source code It prints the source code of various programming languages in pretty way. Additionally it prints lines and also summarizes functions where they are located and other nifty things like make a Postscript file instead of printing it. 
TrueType Fonts
A wide variety of fonts designed to be printer-independent, unlike PostScript fonts. Available for the Apple Macintosh and Windows. Not commonly used with UNIX/Linux. (Also, see BDF Fonts and PostScript Fonts.) 
The word trust has a huge amount of significance within the infosec community. The most immediately connotation is the use of this word instead of "secure". Government standards talk about Trusted Systems rather than secure systems. This is a zen way at looking at security. The main issue hinges around to what degree you can trust systems. If you store confidential information on a computer, you are placing your trust in that computer. More importantly, you are trusting the people/organization that operates that system. 
Advanced permission management system for Linux. The main goal of Linux trustees project is to create an advanced permission management system for linux. In fact, UNIX permission system is not suitable for solution of very common tasks. E.g., let a system administrator wants to create a directory that available for some groups in write mode, for another groups - in read only. The files in the directory and subdirectories should inherits the parent's behavior, unless other is stated explicitly. Using standard UNIX (and Linux) security model it is generally speaking impossible to implement the situation when different groups have read/write and read/only permissions. This issue can be resolved by ext2-fs ACL project, but the problem is that nobody wants to copy mask or ACLs from parent directory to subdirectories either by hands or using special scripts. Using the trustees, you can resolve this problems just typing [/device]/path:+group1:REBX The solution proposed is mainly inspired by Novell Netware approach and Java security API. Special objects (called trustees) can be bounded to every file or directory. Trustee object means that access to file or directory or directory with subdirectories is granted (or denied) to certain user or group (or all except user or group). This package provides settrustee utility, which enables new privileges from trustee.conf. 
Trustix Secure Linux is a server oriented Linux distribution with high emphasis on security. Trustix provides several support alternatives for users of Trustix Secure Linux. The Trustix Secure Linux 2.0 Techology Preview 2 nicknamed Forecast was released February 18, 2003. Trustix Secure Linux 2.0 release candidate 1 (Thunder) was released June 23, 2003. A 'secured' distribution. 
TrX is a project that aims to produce a Debian GNU/Linux-based desktop router and firewall package based on Knoppix. This system will be bootable directly from CD-ROM, so hard disk installation will not be necessary. The initial Freshmeat release of TrX, version 3.2, was made available March 12, 2003. A CD-based distribution. 
test program for the tcp_wrapper 
Interactive spelling checking 
Time Slot 
Time Stamp 
Traffic Shaping 
Transport Stream 
TriState (IC) 
Target Service Agent (Novell, Netware, SMS) 
Telecommunication Society of Australia (org., Australia) 
Technical Support Alliance NETwork (org., manufacturer, Lotus, Oracle, HP, ...), "TSANet" 
Transport Service Access Point (OSI, OSI/RM, SAP) 
Telephony Server Application Programmer Interface (AT&T, Novell, API) 
Triton System Controller (Intel, Triton, IC) 
??? (color system) 
Transport Service Data Unit (OSI, OSI/RM) 
Technical Support Engineer (Sun) 
TestSteuerEinheit (IC) 
[Windows] Terminal Server Edition] (Windows, MS) 
MIDI/TSE3MDL player/converter (tse3play) tse3play plays TSE3MDL files and MIDI files using the TSE3 sequencer engine. It was originally developed as a test application for the TSE3 engine, but is now a fully featured playback application. It can convert files between the two supported formats. Whilst playing it provides text-based visual feedback or can stream an English representation of the contents of the file to standard output. 
Technical System Engineering Environment (Westmount, CASE) 
terminal initialization 
Time Slot Interchanger 
text version of the SIAG spreadsheet The spreadsheet part of the Siag Office suite. Siag is a spreadsheet based on X and scheme. Being based on scheme allows any user to expand the functionality of siag in just about any way imaginable. It can read and write 1-2-3 files for inter-operation with other well-known spreadsheet programs. You can enter expressions in several languages: C, guile, SIOD, Tcl. This one uses a test-based user interface (ncurses). You will find an X11 version in the `siag' package. 
Trusted Systems Interoperability Group (org.) 
Text Service Manager (Apple) 
Time Sharing Monitor (OS, IBM) 
Topology Specific Module (ODI) 
Taiwan Semiconductor Manufacturing Company (manufacturer, Taiwan) 
True Symmetric MultiProcessor 
Task Sequence Number (BS2000) 
Telecommunications Service Order 
Time Sharing Option 
transparent network access through a SOCKS 4 or 5 proxy tsocks provides transparent network access through a SOCKS version 4 or 5 proxy (usually on a firewall). tsocks intercepts the calls applications make to establish TCP connections and transparently proxies them as necessary. This allows existing applications to use SOCKS without recompilation or modification. 
Time Sharing Option/Conversational Monitor System (IBM, VME), "TSO/CMS" 
Time Sharing Option/ ??? (IBM), "TSO/E" 
Thin Small Outline Package (DRAM, IC) 
perform topological sort 
Texture and Shading Processor (IC, Graphik) 
Time Synchronization Protocol 
Travelling Salesman Problem 
Test Synchronization Protocol 1+ (TTCN, ETSI), "TSP1+" 
TAPI Service Provider Interface (TAPI) 
Terminate and Stay Resident 
Task State Segment (Intel) 
Time-Sharing System 
TSS (Telecommunications Standardization Sector)
The TSS develops technically-oriented international communications standards. All member countries of the International Telecommunications Union (ITU), one of the specialized agencies of the United Nations, can participate in the work of TSS. From Glossary of Distance Education and Internet Terminology
Task State Segment Descriptor Cache (CPU) 
Triple SuperTwisted Nematic (LCD) 
Transaction and Switching and Transport Services (BELLCORE) 
TeleSoftWare (T-Online) 
TimeSharing eXecutive (OS, IBM, IBM 1800) 
the Tree and Tabular Combined Notation (OSI, IUT) 
Parser for the TTCN-3 test specification language This is a parser for TTCN-3 (Testing and Test Control Notation 3), a language mainly for testing of communication protocols. Both the language and the parser are still under development. 
TrueType Font 
Install or share some commercial TrueType fonts with windows. This package is for sharing commercial TrueType fonts with windows. But, also it should be used to install fonts from CD-ROM. This package does not contain any fonts. You need to mount the commercial font CD-ROM or windows partition(if you already installed fonts to windows) before install this package. 
utility to generate AFM files for TrueType fonts 
A TrueType to PostScript Type 1 Font Converter Ttf2pt1 is a font converter from the True Typeformat (and some other formats supported by the FreeType library as well) to the Adobe Type1 format. Home Page: 
Ta-Ta For Now (slang, Usenet, IRC) 
A utility to print Chinese text using truetype fonts Ttfprint takes a Chinese text file as input and produce a Postscript version by using Chinese Truetype fonts. You can select the paper size, margin widths, font size, character and line spacing, and more. Other features include date/time and page number insertion and duplex printing. You can also print headers and templates (overlays) graphics (in EPS format) on top of the texts. 
Ttfprint makes a Postscript file from a Chinese text file with Chinese TrueType fonts. 
See time to live (TTL). 
Time To Live (IP) 
Transistor Transistor Logic 
An utility for creating fonts.scale file for TTF fonts. ''This program is for users of xfsft by Juliusz Chroboczek and Mark Leisher. It reads TrueType fonts and creates a suitable fonts.scale file for use with the above mentioned X font server.'' (Joerg Pommnitz' README) 'ttmkfdir' works excellent for both TT-aware font servers, i.e. xfsft and xfs-xtt. 
Tagged-Text Markup Language (Nokia, mobile-systems) 
Tiny Transmission Protocol (IRDA, IRLMP) 
Trusted Third Parties (cryptography) 
Time Token Rotation Protocol (FDDI) 
Target Token Rotation Time (FDDI) 
Text To Speech [system] 
Transaction Tracking System (DB, Netware) 
Trouble Ticketing System 
tty TV application TV application for terminals, based on aalib. Uses video4linux devices as video input. 
/T-T-Y/, /tit'ee/ n. The latter pronunciation was primarily ITS, but some Unix people say it this way as well; this pronunciation is not considered to have sexual undertones. 1. A terminal of the teletype variety, characterized by a noisy mechanical printer, a very limited character set, and poor print quality. Usage: antiquated (like the TTYs themselves). See also bit-paired keyboard. 2. [especially Unix] Any terminal at all; sometimes used to refer to the particular terminal controlling a given job. 3. [Unix] Any serial port, whether or not the device connected to it is a terminal; so called because under Unix such devices have names of the form tty*. Ambiguity between senses 2 and 3 is common but seldom bothersome. 
An abbreviation for TeleType, which is used in Linux to mean terminal. For example, tty03 means terminal number 3. 
controlling terminal 
print the file name of the terminal connected to standard input 
ttylinux is a minimalistic Linux distribution that can run in as little as 2.88 megabytes of space. It will provide only a text-based interface, but it enables you to dial into the Internet and surf web pages even on a low-end machine. Version 3.1 was released April 8, 2003. A small disk distribution. 
serial port logger Print everything onto stdout what comes from a serial device. You can specify the device and the baud rate. 
A tty recorder ttyrec is a tty recorder. A recorded data can be playback with the included ttyplay command. ttyrec is just a derivative of script command for recording timing information with microsecond accuracy as well. It can record emacs -nw, vi, lynx, or any programs running on tty. 
TTY Snoop - allows you to spy on telnet+serial connections TTYSnoop allows you to snoop on login tty's through another tty-device or pseudo-tty. The snoop-tty becomes a 'clone' of the original tty, redirecting both input and output from/to it. 
The Uucp Analyzer Its purpose is to collect all the information that the UUCP package puts in its various logs. It then builds up a clear report, showing data from several different points of view. 
An emacs-mode for ocaml programs. Tuareg is a Caml mode for GNU Emacs and XEmacs. It handles automatic indentation of Objective Caml and Camllight codes. Key parts of the code are highlighted using Font-Lock. Support to run an interactive Caml toplevel and debugger is provided. This mode attempts to give better results than the one provided in the standard distribution OCaml 3.x. Indentation rules are slightly different but closer to classical functional languages indentation. 
Technische Universitaet Berlin (org.) 
TCP and UDP with Bigger Addresses (TCP, UDP, RFC 1347) 
1. n. A CRT terminal. Never used in the mainstream sense of TV; real hackers don't watch TV, except for Loony Toons, Rocky & Bullwinkle, Trek Classic, the Simpsons, and the occasional cheesy old swashbuckler movie. 2. [IBM] To send a copy of something to someone else's terminal. "Tube me that note?" 
tube time
n. Time spent at a terminal or console. More inclusive than hacking time; commonly used in discussions of what parts of one's environment one uses most heavily. "I find I'm spending too much of my tube time reading mail since I started this revision." 
Total User Cell count (UNI) 
Total User Cell Difference (UNI) 
TeX User's Group (org., user group, TeX) 
Text-Based User Interface (UI) 
Technische Universitaet Muenchen (org.) 
vt. [from automotive or musical usage] To optimize a program or system for a particular environment, esp. by adjusting numerical parameters designed as hooks for tuning, e.g., by changing #define lines in C. One may `tune for time' (fastest execution), `tune for space' (least memory use), or `tune for configuration' (most efficient use of hardware). See bum, hot spot, hand-hacking. 
adjust tunable filesystem parameters on second extended filesystems 
set various parameters for the lp device 
Toronto UNIversity System (OS) 
A way of establishing an outbound connection through a firewall in such a way that it is neither blocked or monitored. This isn't a way of breaking through a firewall, but assuming you've compromised a machine on the other side of a firewall (through some other technique), this will allow you to communicate with that machine from the Internet. It is also used by people behind firewalls that use restrictive rulesets: users simply create a tunnel back to their home machine. Example: People have written tunnels over ICMP, DNS, HTTP, e-mail messages, and TCP connections. Tunnels can either by of the "port redirector" style (which run on top of any TCP/IP stack) or of the network interface variety (below the TCP/IP stack requiring kernel mod). 
Encrypted network connection within a TCP/IP connection Tunnel Vision creates a "virtual" TCP/IP network (VPN) between two Tunnel Vision-capable sites on the internet. It uses the strongest encryption that's actually useful (1024-bit RSA and 128-bit Blowfish) to protect your data along the way. This connection between two TV servers is called a "tunnel." Tunnel Vision is usually used on a router or gateway machine. When someone on your network wants to send data to someone on the other side of the tunnel, it sends through the default gateway (the TV server) like it normally would. You configure the TV server to send data through the tunnel instead of just forwarding it onto the internet. Tunnel Vision requires Linux 2.1.122 or higher with the ethertap and netlink devices. 
Telephone User Path (ISDN) 
Website development framework. Turbine is a servlet based framework that allows experienced Java developers to quickly build secure web applications. Parts of Turbine can also be used independently of the web portion of Turbine as well. 
Turbolinux supports a variety of platforms and Asian languages. They are the Asian arm of UnitedLinux. Turbolinux Enterprise Server 8 powered by UnitedLinux is currently available. 
Fidonet and Usenet statistics program Turquoise SuperStat is a simple but powerful Fidonet and Usenet message base statistics program that can read messages that are stored in SDM (*.MSG), SquishMail, JAM, FDAPX/w and MyPoint message bases as well as local or remote (NNTP) Usenet news spools. This is the command line based version. 
Transistor Under Test 
Tux the Penguin is the official emblem of Linux, This eventuated after a logo contest in 1996, during which Linus Torvalds endorsed the idea of a penguin logo in a couple of famously funny postings. Linus explained that he was once bitten by a killer penguin in Australia and has felt a special affinity for the species ever since. (Linus has since admitted that he was also thinking of Feathers McGraw, the evil-genius penguin jewel thief who appeared in a Wallace & Grommit feature cartoon, "The Wrong Trousers".) Larry Ewing designed the official Tux logo. It has proved a wise choice, amenable to hundreds of recognizable variations used as emblems of Linux-related projects, products, and user groups. In fact, Tux has spawned an entire mythology, of which the Gospel According to Tux and the mock-epic poem "Tuxowolf" are among the best-known examples. There is a `real' Tux - a black-footed penguin resident at the Bristol Zoo. Several friends of Linux bought a zoo sponsorship for Linus as a birthday present in 1996. 
3D Puzzle Game with Tux the Penguin Tux: A quest for herring is a 3D search/explore/puzzle game. Follow our Hero Tux the Penguin in a quest for eight golden herring. Game is in full 3rd person perspective, It's written in OpenGL. Initial release has only a handful of playable levels - but it's all OpenSourced under GPL and hopefully enough people will want to help with the development to turn this into something very special. 
a fancy version of xeyes This package displays Tux, Chuck (the BSD daemon), Luxus, or Dust Puppy following your mouse cursor in X with their eyes. 
A 3D go-kart racing game. TuxKart is a 3D go-kart racing game with several famous OpenSource mascots participating. There are several race courses provided, with full information on how to add your own. Except for a few minor details, this game is essentially complete, and very playable. 
"Shufflepuck Cafe" Clone Anyone remember "Shufflepuck Cafe" for the Amiga/AtariST? I do. TuxPuck is a shufflepuck game written in C using SDL. The player moves a pad around a board and tries to shoot down the puck through the opponents defense. 
3D racing game featuring Tux, the Linux penguin Tux Racer is a simple OpenGL-based racing game featuring Tux, the Linux Penguin. The object of the game is to slide down a snow- and ice-covered mountain as quickly as possible, avoiding the trees and rocks that will slow you down. 
Tux Racer is a simple OpenGL-based racing game featuring Tux. The object of the game is to slide down a snow- and ice-covered mountain as quickly as possible, avoiding the trees and rocks that will slow you down. 
Educational Typing Tutor Game Starring Tux TuxTyping is an educational typing tutorial game starring Tux, the Linux Penguin. The player guides Tux to eat fish which are falling from the top of the screen. Each fish has a letter written on it. When the player presses the corresponding key, Tux will position himself to eat the fish. The game is intended for children learning to type, though it does have higher difficulty levels which even experienced typists may find challenging. 
TV OnLine cable service (WorldGate, Internet) 
Terminal Velocity Operating System (3drealms) 
Transparent Voice Signalling (VOFR) 
TeilnehmerVermittlungsSTelle (Telekom), "TVSt" 
Technology Without An Important Name 
Terrestrial Wide-Band [networking] 
Clock program for hamradio operators This is a clock program which will displays the current time in major cities around the world. The current time at some point on the globe is determined using the time zone information contained in the files located under the directory /usr/share/zoneinfo. A file selection box allows you to pick the area or city of interest. The clock will then display the current time for the selected location. 
vt. 1. To change slightly, usually in reference to a value. Also used synonymously with twiddle. If a program is almost correct, rather than figure out the precise problem you might just keep tweaking it until it works. See frobnicate and fudge factor; also see shotgun debugging. 2. To tune or bum a program; preferred usage in the U.K. 
n. 1. Tilde (ASCII 1111110, ~). Also called `squiggle', `sqiggle' (sic -- pronounced /skig'l/), and `twaddle', but twiddle is the most common term. 2. A small and insignificant change to a program. Usually fixes one bug and generates several new ones (see also shotgun debugging). 3. vt. To change something in a small way. Bits, for example, are often twiddled. Twiddling a switch or knobs implies much less sense of purpose than toggling or tweaking it; see frobnicate. To speak of twiddling a bit connotes aimlessness, and at best doesn't specify what you're doing to the bit; `toggling a bit' has a more specific meaning (see bit twiddling, toggle). 4. Uncommon name for the twirling baton prompt. 
The Web Information Gateway TWIG is a groupware client designed to be used with web browsers. The main goal was to provide an IMAP client, but it now offers agenda, news-reader, bookmarks, contact list and other features. TWIG can be used as a webmail app with remote mail and news servers, so these are not needed in the local machine. This package is prepared to be used with either MySQL or PostgreSQL, but it is possible to use it with many other databases if properly configured. More info about TWIG can be found in 
a Text mode WINdow environment. Twin is a windowing environment with mouse support, window manager, terminal emulator and networked clients, all inside a text display. It supports a variety of displays: * plain text terminals (any termcap/ncurses compatible terminal, Linux console, twin's own terminal emulator); * X11, where it can be used as a multi-window xterm; * itself (you can display a twin on another twin); * twdisplay, a general network-transparent display client, used to attach/detach more displays on-the-fly. 
twirling baton
n. [PLATO] The overstrike sequence -/|\-/|\- which produces an animated twirling baton. If you output it with a single backspace between characters, the baton spins in place. If you output the sequence BS SP between characters, the baton spins from left to right. If you output BS SP BS BS between characters, the baton spins from right to left. This is also occasionally called a twiddle prompt. The twirling baton was a popular component of animated signature files on the pioneering PLATO educational timesharing system. The archie Internet service is perhaps the best-known baton program today; it uses the twirling baton as an idler indicating that the program is working on a query. The twirling baton is also used as a boot progress indicator on several BSD variants of Unix; if it stops you're probably going to have a long and trying day. 
Event-based framework for internet applications. It includes a web server, a telnet server, a multiplayer RPG engine, a generic client and server for remote object access, and APIs for creating new protocols. 
Logging program for hamradio operators This GUI program records basic Ham log information. It is for day to day logging, not contesting. There is no dup checking and contest related things like that. My keyboard is where my logbook used to be, so why not use the computer to log QSOs! The interface can be customized without re-compiling. A resource file allows you to modify the menus for the bands, modes, etc. that you use. Most of the log entries can be made with a button press or a single key stroke. It records the date, start and end times, call sign, band, mode, power, and signal reports. There is also a field for general notes. A second window allows you to search and edit the log file, and a third window provides online help. The help file can also be view with any unix command or editor at any time. 
Tab Window Manager for the X Window System 
Tab Window Manager for the X Window System 
Tab window manager twm is a window manager for the X Window System. It provides title bars, shaped windows, several forms of icon management, user-defined macro functions, click-to-type and pointer-driven keyboard focus, and user-specified key and pointer button bindings. 
a simple secure efficient FTP server This is twoftpd, a new FTP server that strives to be secure, simple, and efficient. None of the commands can cause execution of other programs, and the normal model of execution does a chroot to the logged in user's directory immediately after authentication. The name "twoftpd" comes from the fact that there were two parts to the server -- an authenticating front end, which contains no file or data transfer code, and a back end, which contains all the data transfer code. 
Time Warp Operating System (OS, Hypercube) 
Soundcard-based X program for operating PSK31 Twpsk uses a soundcard to receive and transmit PSK31, an extremely narrow band HF-mode. PSK31 is a mode for keyboard QSO's. 
Utilities for twin Utilities that fits well with the Text WINdow manager, twin. it currently only contains twkalc, a calculator. 
Times-likes font for TeX. TX fonts consist of 1. virtual text Roman fonts using Adobe Times (or URW NimbusRomNo9L) in OT1, T1, TS1, and LY1 encodings (with some modified and additional text symbols) 2. virtual text sans serif fonts using Adobe Helvetica (or URW NimbusSanL) in OT1, T1, TS1, and LY1 encodings (with additional text symbols) 3. monospaced typewriter fonts in OT1, T1, TS1, and LY1 encodings 4. math alphabets using Adobe Times (or URW NimbusRomNo9L) with modified metrics 5. math fonts of all symbols corresponding to those of Computer Modern math fonts (CMSY, CMMI, CMEX, and Greek letters of CMR) 6. math fonts of all symbols corresponding to those of AMS fonts (MSAM and MSBM) 7. additional math fonts of various symbols 
Text to HTML converter. txt2html is a Perl program that converts plain text to HTML. It supports headings, lists, simple character markup, and hyperlinking, and is highly customizable. It recognizes some of the apparent structure of the source document (mostly whitespace and typographic layout), and attempts to mark that structure explicitly using HTML. the purpose for this tool is to provide an easier way of converting existing text documents to HTML format. txt2html can also be used to aid in writing new HTML documents, but there are probably better ways of doing that. 
Convert plain text files to Palm DOC (for PalmOS) and back This utility converts plain text files (or HTML files) to the de facto PalmOS standard DOC format for use in document readers (such as "C Spot Run") and editors (such as "ZDOC"). DOC files are compressed by default, and txt2pdbdoc can also convert DOC files back to plain text. WARNING: Generated PDB files (for this and previous versions) may cause problems on the Palm if they are installed by some method other than hotsyncing (e.g. via a memory card). See bug #118930 for details. 
A Regular Expression "wizard", all written with bash2 builtins ^txt2regex$ is a Regular Expression "wizard", all written with bash2 builtins, that converts human sentences to RegExs. With a simple interface, you just answer to questions and build your own RegEx for a large variety of programs, like awk, emacs, grep, perl, php, procmail, python, sed and vim. There are more than 20 supported programs. 
TXT Resource Record (DNS, RFC 1035), "TXT-RR" 
PalmPalm Technology is a Korean based company. They put Tynux into the Zaurus PDA and other appliances. 
Install Adobe Type 1 fonts into X11 and Ghostscript type1inst is a small perl script which generates the "fonts.scale" file required by an X11 server to use any Type 1 PostScript fonts which exist in a particular directory. It gathers this information from the font files themselves, a task which previously was done by hand. The script is also capable of generating the similar "Fontmap" file used by ghostscript. It can also generate sample sheets for the fonts. The xutils package contains a utility called makepsres, which creates output in a different format but which may nevertheless be more useful. 
Zap words flying across the screen by typing them correctly This program will display words flying across the screen from left to right. Zap the words by typing them in. If they reach the right side of the screen, they disappear and you get no credit for them. Miss too many words and the game is over. 
UC's VHDL Simulation Runtime Libraries - shared library only This package contains the University of Cincinnati's VHDL runtime libraries. These libraries are required to run VHDL simulations compiled with the SAVANT analyzer. 
Time Zone (Internet, TZ)
script that prints coordinates of a named timezone 
select a time zone 
view timezones 
set the local timezone 
Displays time and date in specified time zones on console This shell script displays the time and date of time zones specified by the user. The time zones may be entered by hand in TZ format or chosen from a list prepared from /usr/share/zoneinfo/ The zone list is kept in a format consistent with the GTK+ application gworldclock. 

Комментариев нет:

Отправить комментарий